Статті в журналах з теми "Symmetric encryption techniques"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Symmetric encryption techniques".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Parenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Повний текст джерелаMalhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.
Повний текст джерелаChowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.
Повний текст джерелаM, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Повний текст джерелаPushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Повний текст джерелаKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Повний текст джерелаAhamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.
Повний текст джерелаZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Повний текст джерелаParveen Sehgal, Satinder ,. "Design a Hybrid Algorithm for Data Encryption to Implementation in Database." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (October 16, 2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.
Повний текст джерелаUbaidullah, Mohammad, and Qahtan Makki. "A Review on Symmetric Key Encryption Techniques in Cryptography." International Journal of Computer Applications 147, no. 10 (August 16, 2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.
Повний текст джерелаThomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment." International Journal of Natural Computing Research 10, no. 2 (April 2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Повний текст джерелаParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Повний текст джерелаDhiman, Oshin, and Anand Sharma. "Enhancement for Secured File Storage Using Modern Hybrid Cryptography." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 1 (March 31, 2022): 01–07. http://dx.doi.org/10.17762/ijfrcsce.v8i1.2083.
Повний текст джерелаChandrakala B M, Latha A P, B. V. Shruti. "Optimizing the Application of Hybrid Cryptographic Methods for Secure File Storage and Retrieval." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (October 27, 2023): 2126–33. http://dx.doi.org/10.52783/tjjpt.v44.i4.1191.
Повний текст джерелаBenyahia, Kadda, Meftah Mustapha, and Latreche Abdelkrim. "A Bio-Inspired Algorithm for Symmetric Encryption." International Journal of Organizational and Collective Intelligence 10, no. 1 (January 2020): 1–13. http://dx.doi.org/10.4018/ijoci.2020010101.
Повний текст джерелаAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Повний текст джерелаHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Повний текст джерелаJabir, Hawraa. "An Overview of Parallel Symmetric Cipher of Messages." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 31, no. 2 (June 29, 2023): 19–33. http://dx.doi.org/10.29196/jubpas.v31i2.4652.
Повний текст джерела., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Повний текст джерелаRabie, A., Kh El Shafie, A. Hammuoda, and M. Rohiem. "Data ecryption based on multi-order FrFT, and FPGA implementation of DES algorith." International Journal of Reconfigurable and Embedded Systems (IJRES) 9, no. 2 (July 1, 2020): 141. http://dx.doi.org/10.11591/ijres.v9.i2.pp141-152.
Повний текст джерелаAminudin, Nur, Andino Maseleno, Shankar K, S. Hemalatha, K. Sathesh kumar, Fauzi ., Rita Irviani, and Muhamad Muslihudin. "Nur Algorithm on Data Encryption and Decryption." International Journal of Engineering & Technology 7, no. 2.26 (May 7, 2018): 109. http://dx.doi.org/10.14419/ijet.v7i2.26.14363.
Повний текст джерелаManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Повний текст джерелаTumati, Gowtham, Yalamarthi Rajesh, Manogna T, and J. Ram Kumar. "A New Encryption Algorithm Using Symmetric Key Cryptography." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 436. http://dx.doi.org/10.14419/ijet.v7i2.32.15734.
Повний текст джерелаKuppuswamy, Prakash, and Dr Saeed Q Y Al-Khalidi. "IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (October 30, 2012): 335–38. http://dx.doi.org/10.24297/ijct.v3i2c.2896.
Повний текст джерелаHe, Wei, Yu Zhang, and Yin Li. "Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search." Symmetry 14, no. 5 (May 18, 2022): 1029. http://dx.doi.org/10.3390/sym14051029.
Повний текст джерелаGui, Zichen, Kenneth G. Paterson, Sikhar Patranabis, and Bogdan Warinschi. "SWiSSSE: System-Wide Security for Searchable Symmetric Encryption." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (January 2024): 549–81. http://dx.doi.org/10.56553/popets-2024-0032.
Повний текст джерелаKour, Avleen. "Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4375–80. http://dx.doi.org/10.22214/ijraset.2021.36037.
Повний текст джерелаHarba, E. S. I. "Secure Data Encryption Through a Combination of AES, RSA and HMAC." Engineering, Technology & Applied Science Research 7, no. 4 (August 9, 2017): 1781–85. http://dx.doi.org/10.48084/etasr.1272.
Повний текст джерелаBerisha, Artan, and Hektor Kastrati. "Parallel impelementation of RC6 algorithm." Journal of Computer Science and Technology Studies 3, no. 2 (June 26, 2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.
Повний текст джерелаVennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.
Повний текст джерелаDhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, and Shashank Singh. "Neural Network Based Message Concealment Scheme." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.
Повний текст джерелаRaja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique." International Journal of Wavelets, Multiresolution and Information Processing 17, no. 05 (September 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.
Повний текст джерелаVergoossen, Tom, Robert Bedington, James A. Grieve, and Alexander Ling. "Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded." Entropy 21, no. 4 (April 10, 2019): 387. http://dx.doi.org/10.3390/e21040387.
Повний текст джерелаVerma, Saurav, Mahek Pokharna, and Vishal Mishra. "Identifying and analyzing Risk Mitigation strategies in IOT devices using Light Weight Symmetric Encryption Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 638–46. http://dx.doi.org/10.22214/ijraset.2022.46697.
Повний текст джерелаKaushik, Bharti, Vikas Malik, and Vinod Saroha. "A Review Paper on Data Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.
Повний текст джерелаLai, Jian-Foo, and Swee-Huay Heng. "Secure File Storage On Cloud Using Hybrid Cryptography." Journal of Informatics and Web Engineering 1, no. 2 (September 15, 2022): 1–18. http://dx.doi.org/10.33093/jiwe.2022.1.2.1.
Повний текст джерелаAlothman, Raya Basil, Imad Ibraheem Saada, and Basma Salim Bazel Al-Brge. "A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing." Journal of Cases on Information Technology 24, no. 2 (April 2022): 1–18. http://dx.doi.org/10.4018/jcit.20220101.oa1.
Повний текст джерелаPark, Juhyun, and Yongsu Park. "Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing." Electronics 9, no. 6 (June 8, 2020): 957. http://dx.doi.org/10.3390/electronics9060957.
Повний текст джерелаBhandari, Ashok Singh. "Analysis of Computational Algebra for Cryptography and Coding Theory Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (January 31, 2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.
Повний текст джерелаYesin, V. I., and V. V. Vilihura. "Research on the main methods and schemes of encryption with search capability." Radiotekhnika, no. 209 (June 24, 2022): 138–55. http://dx.doi.org/10.30837/rt.2022.2.209.14.
Повний текст джерелаKovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Повний текст джерелаAdy Putra, Wahyu, Suyanto Suyanto, and Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security." SinkrOn 8, no. 2 (April 6, 2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Повний текст джерелаSeelamanthula Sreenivasu, Et al. "DAR Model: A Novel Symmetric Key Enabled Security architecture for reliable data transfer in Wireless Sensor Networks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 717–28. http://dx.doi.org/10.17762/ijritcc.v11i10.8568.
Повний текст джерелаHanin, Charifa, Fouzia Omary, Souad Elbernoussi, Khadija Achkoun, and Bouchra Echandouri. "A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 54–67. http://dx.doi.org/10.4018/ijisp.2018100104.
Повний текст джерелаAlmaiah, Mohammed Amin, Ziad Dawahdeh, Omar Almomani, Adeeb Alsaaidah, Ahmad Al-Khasawneh, and Saleh Khawatreh. "A new hybrid text encryption approach over mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6461. http://dx.doi.org/10.11591/ijece.v10i6.pp6461-6471.
Повний текст джерелаJasim, Khalid F., Reem J. Ismail, Abdullah A. Nahi Al-Rabeeah, and Soma Solaimanzadeh. "Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices." Cihan University-Erbil Scientific Journal 5, no. 2 (September 1, 2021): 13–19. http://dx.doi.org/10.24086/cuesj.v5n2y2021.pp13-19.
Повний текст джерелаSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (January 11, 2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Повний текст джерелаWang, Peng, and Xiang Li. "TEDL: A Text Encryption Method Based on Deep Learning." Applied Sciences 11, no. 4 (February 17, 2021): 1781. http://dx.doi.org/10.3390/app11041781.
Повний текст джерелаM. Subhashini, K. Shankar,. "Hybrid Encryption based Access Control Approach for Securing Cloud Computing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (October 30, 2023): 1056–63. http://dx.doi.org/10.17762/ijritcc.v11i9.8998.
Повний текст джерелаChatterjee, Runa, Rajdeep Chakraborty, and Mondal J.K. "DESIGN OF LIGHTWEIGHT CRYPTOGRAPHIC MODEL FOR END-TO-END ENCRYPTION IN IOT DOMAIN." IRO Journal on Sustainable Wireless Systems 1, no. 04 (December 8, 2019): 215–24. http://dx.doi.org/10.36548/jsws.2019.4.002.
Повний текст джерела