Search

Showing total 300 results

Search Constraints

Start Over You searched for: Topic data encryption Remove constraint Topic: data encryption Publication Year Range This year Remove constraint Publication Year Range: This year
300 results

Search Results

1. The State of Cyber Resilience: Advancements and Future Directions

2. COMPARATIVE SECURITY AND COMPLIANCE ANALYSIS OF SERVERLESS COMPUTING PLATFORMS: AWS LAMBDA, AZURE FUNCTIONS, AND GOOGLE CLOUD FUNCTIONS.

3. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

4. Streaming traffic classification: a hybrid deep learning and big data approach.

5. Secure Messaging using Blockchain Technology.

6. Lightweight Pseudo Random Number Generator for Embedded Systems.

7. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.

8. Cloud computing empowerment: a comprehensive examination of adoption, security, and efficiency in legal industry.

9. THE USE OF THE COMMAND LINE INTERFACE IN THE VERIFICATION AND MANAGEMENT OF THE SECURITY OF IT SYSTEMS AND THE ANALYSIS OF THE POTENTIAL OF INTEGRATING BIOMETRIC DATA IN CRYPTOGRAPHIC MECHANISMS.

10. Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.

11. Adapting confiscation and anti-money laundering laws to the digital economy: exploring the Australian interplay between proceeds and technology.

12. A Fully Homomorphic Encryption based approach for Privacy Preserved Pre-processing of Medical Transcripts.

13. Study of a high-precision complex 3D geological modelling method based on a fine KNN and kriging coupling algorithm: a case study for Jiangsu, China.

14. Strengthening Network Security through Chaotic Maps-Augmented ChaCha20 Encryption: An Extensive Exploration.

15. Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers.

16. Three-Dimensional Double Random-Phase Encryption for Simultaneous Two-Primary Data.

17. IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency.

18. Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access.

19. CLARIFYING DEFINITIONS: A SCOPING REVIEW OF DATA PHYSICALIZATION IN HUMAN-COMPUTER INTERACTION.

20. Beyond neural data: Cognitive biometrics and mental privacy.

21. A randomized encryption algorithm for the MPEG-DASH digital rights management.

22. Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission.

23. A Study on AG-Groups in Spherical Fuzzy Environment.

24. Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries.

25. Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance.

26. Soft Set Decision and Cluster Percolation Method-Based Policy Clustering and Encryption Optimization for CP-ABE.

27. Disruption mitigation in the semiconductors supply chain by using public blockchains.

28. A New Approach for Enhancing AES-Based Data Encryption Using ECC.

29. A fuzzy optimal lightweight convolutional neural network for deduplication detection in cloud server.

30. An In-Depth Analysis of Steganography Techniques: From Classical Edge Detection to Adaptive Approaches.

31. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

32. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

33. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud.

34. Physical Layer Encryption for CO-OFDM Systems Enabled by Camera Projection Scrambler.

35. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

36. EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.

37. Perform The Complex EFG Transform in Cryptography.

38. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System.

39. Block of Data Encryption Using the Modified XTEA Algorithm.

40. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile.

41. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

42. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System.

43. The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.

44. Constructive approach and randomization of a two-parameter chaos system for securing data.

45. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

46. Hiding Secrets in Programs: Technical Perspective.

47. An Efficient Lightweight Authentication Scheme for Smart Meter.

48. Construction of a network intelligence platform for privacy protection and integrated big data mining.

49. E2EE enhanced patient-centric blockchain-based system for EHR management.

50. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.