Search

Your search keyword '"DATA encryption"' showing total 5,511 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Database Directory of Open Access Journals Remove constraint Database: Directory of Open Access Journals Database Supplemental Index Remove constraint Database: Supplemental Index
5,511 results on '"DATA encryption"'

Search Results

1. Enhancing privacy and security in IoT-based smart grid system using encryption-based fog computing.

2. Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack.

3. Some Remarks on Cocks' Identity-Based Encryption Scheme.

4. Design of data storage scheme for coal mine personnel precise positioning system

5. Information encoding and encryption in acoustic analogues of qubits

6. User-centric secured smart virtual assistants framework for disables.

7. Secure Data Delivery in a Software-Defined Wireless Body Area Network.

8. Design of a new DNA Encryption Algorithm based on Simon Algorithm.

9. Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.

10. Robust optical multi-image encryption with lossless decryption Recovery Based on phase recombination and vector decomposition

11. Hadoop-based secure storage solution for big data in cloud computing environment

12. A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks

13. Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things

14. Securing Design IP in Distributed Manufacturing.

15. A comparative analysis of chaos theory based medical image steganography to enhance data security.

16. Lightweight Secure Compression Scheme for Green IoT Applications.

17. Deep Homeomorphic Data Encryption for Privacy Preserving Machine Learning.

18. Application of IoT audio technology based on sensor networks in English speaking teaching system

19. High speed national secret SM4 optical fiber communication system scheme based on FPGA

20. DNA Secret Writing With Laplace Transform of Mittag-Leffler Function

21. Some Properties and Algorithms for Twin Primes

22. ShinyAnonymizer Enhanced Version and Beyond: A Further Exploration of Privacy-Preserving Solutions in Health Data Management

23. Homomorphism on bipolar-valued fuzzy sub-bigroup of a bigroup for secured data transmission over WSN.

24. Fully Homomorphic Encryption of FloatingPoint Matrices for Privacy-Preserving Image Processing.

25. Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion.

26. Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management.

27. An intelligent encryption decision method for autonomous domain of multilayer satellite network.

28. A unified security authentication technology based on human-machine interaction for new-type power systems

29. BLOCK CIPHER PERFORMANCE AND RISK ANALYSIS

30. BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things.

31. Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm.

32. Security and data encryption effect of high ciphertext based on improved RC6 algorithm for WSN

33. An efficient encryption method for smart grid data based on improved CBC mode

34. Analytical Approach for Data Encryption Standard Algorithm.

35. Research on smart city data encryption and communication efficiency improvement under federated learning framework.

36. Design of Computer Network Security Intrusion Prevention Strategy and Evaluation Algorithm Analysis Technology.

37. Research on Accounting Data Encryption Processing System based on Artificial Intelligence.

38. An Improved Pairing-Free Ciphertext Policy Framework for IoT.

39. Graph-Based Replication and Two Factor Authentication in Cloud Computing.

40. Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm.

41. Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing.

42. Research on Secure Transmission of Heterogeneous Network.

43. Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation

44. Continuing Education Network Data Center Model Based on Fractional Differential Mathematical Equations

45. GeFL: Gradient Encryption-Aided Privacy Preserved Federated Learning for Autonomous Vehicles

46. Efficient and lightweight data encryption scheme for embedded systems using 3D-LFS chaotic map and NFSR

47. Cryptographic Data Security for Reliable Wireless Sensor Network.

48. Secured Health Data Transmission Using Lagrange Interpolation and Artificial Neural Network.

49. A QR Code Used for Personal Information Based on Multi-Layer Encryption System.

50. A quantitative study on the usage of a cryptographic software tool for data and communications encryption.

Catalog

Books, media, physical & digital resources