Search

Your search keyword '"DATA encryption"' showing total 64 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Database Directory of Open Access Journals Remove constraint Database: Directory of Open Access Journals
64 results on '"DATA encryption"'

Search Results

1. Hadoop-based secure storage solution for big data in cloud computing environment

2. A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks

3. Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things

4. High speed national secret SM4 optical fiber communication system scheme based on FPGA

5. DNA Secret Writing With Laplace Transform of Mittag-Leffler Function

6. Application of IoT audio technology based on sensor networks in English speaking teaching system

7. A unified security authentication technology based on human-machine interaction for new-type power systems

8. Security and data encryption effect of high ciphertext based on improved RC6 algorithm for WSN

9. An efficient encryption method for smart grid data based on improved CBC mode

10. Efficient and lightweight data encryption scheme for embedded systems using 3D-LFS chaotic map and NFSR

11. Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation

12. Continuing Education Network Data Center Model Based on Fractional Differential Mathematical Equations

13. GeFL: Gradient Encryption-Aided Privacy Preserved Federated Learning for Autonomous Vehicles

14. On one Block Cipher Mode of Operation Used to Protect Data on Block-Oriented Storage Devices

15. Lightweight Cryptography for Connected Vehicles Communication Security on Edge Devices

16. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm

17. A five-safes approach to a secure and scalable genomics data repository

18. RSCV: Reversible Select, cross and variation architecture in quantum‐dot cellular automata

19. Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method

20. CUNA: A privacy preserving medical records storage in cloud environment using deep encryption

21. Joint Encryption Model Based on a Randomized Autoencoder Neural Network and Coupled Chaos Mapping

22. Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography

23. Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment

24. Data encryption based on 7D complex chaotic system with cubic memristor for smart grid

25. Secure Access Control to Data in Off-Chain Storage in Blockchain-Based Consent Systems

26. Image super-resolution reconstruction for secure data transmission in Internet of Things environment

27. Safe clinical photography: best practice guidelines for risk management and mitigation

28. A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption

29. Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications

30. Constructing a Secure Data Storage System That Supports Multiple Functions by Using Key Aggregation for Data Sharing in Cloud Storage: A Review

31. Throughput Optimized Reversible Cellular Automata Based Security Algorithm

32. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach

33. Preference Preserved Privacy Protection Scheme for Smart Home Network System Based on Information Hiding

34. A Secure Energy-Saving Communication and Encrypted Storage Model Based on RC4 for EHR

35. Providing a Secure Protocol in Smart Metering Networks Based on the Internet of Things

36. Hybrid Method between the Discrete Wavelets Translate Technique and the Chaos System Based by the Least Significant Bit Algorithm to Encrypt and Hide a Digital Video File

37. A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing

38. A Multi-Source Big Data Security System of Power Monitoring Network Based on Adaptive Combined Public Key Algorithm

39. Secure Data Communication using File Hierarchy Attribute Based Encryption in Wireless Body Area Networks

40. AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

41. Security-Enhanced 3D Data Encryption Using a Degradable pH-Responsive Hydrogel

42. Secure Data Encryption Through a Combination of AES, RSA and HMAC

43. APPLICABLE LIGHT-WEIGHT CRYPTOGRAPHYTOSECURE MEDICAL DATA IN IOT SYSTEMS

44. Data encryption technology for coal mine safety monitoring and control system

45. Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations

46. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption

47. Secure point-to-point communication using chaos

48. Big Data, indispensable today

49. New RSA Encryption Mechanism Using One-Time Encryption Keys and Unpredictable Bio-Signal for Wireless Communication Devices

50. Application of Data Encryption Technology in Electric Power Informationization

Catalog

Books, media, physical & digital resources