Search

Your search keyword '"DATA encryption"' showing total 146 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal aip conference proceedings Remove constraint Journal: aip conference proceedings
146 results on '"DATA encryption"'

Search Results

1. Proposed lightweight secure channel for RFID.

2. A comprehensive review on S-box generation methods.

3. Research on resource allocation algorithm of D2D communication technology in 5G network.

4. A non-redundant cost-effective platform and data security in cloud computing using improved lightweight standalone framework over data encryption standard algorithm.

5. A non redundant profitable framework and information protection in cloud-computing for upgraded lightweight detached structure over El Gamal Encryption method.

6. Implementation of Hill Cipher Algorithm and Arnold Cat Map (ACM) algorithm on Iris digital image security.

7. An end-to-end security and privacy preserving approach for multi cloud environment using multi level federated and lightweight deep learning assisted homomorphic encryption based on AI.

8. Random shift and OTP based encryption and decryption.

9. A comparative analysis of some recently proposed one-dimensional chaotic maps for IoT device data encryption.

10. A comprehensive review of wireless body area network in medical applications.

11. A data security model for internet of things applications.

12. Enhancement of KASUMI algorithm by adding hamming code.

13. An innovative approach for runtime analysis of 128 bits AES algorithm by comparing with DES algorithm using VHDL.

14. Functional analysis of the use of blockchain technology in the internet of things (IoT).

15. A dynamic encryption scheme for moving object protection using network coding and DES.

16. Fog computing security using token-based authentication system.

17. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

18. Modifications and improvements to the two fish encryption algorithm: A review.

19. Security architecture and applications: Blockchain perspective.

20. An approach for runtime analysis of 128 bits innovative advanced encryption standard algorithm over triple DES algorithm using VHDL.

21. A novel comparative data security analysis in public auditing for trusted cloud service with SSL encryption over multi-tenancy based access control technique.

22. A novel image retrieval method for encryption and decryption to preserve privacy using AES algorithm and comparing accuracy with DES algorithm.

23. Design and FPGA implementation machine learning based steller matrix encryption and decryption for high throughput and low latency.

24. Performance analysis of some analog NTRU public key.

25. Implementing blockchain in airline ticketing system.

26. Review of data encryption technology and protection approach in cloud computing.

27. Secured online examination system using laravel framework.

28. Hiding speech in video using swarm optimization and data mining.

29. Rating prediction and email query processing.

30. Enhancement datagram transport layer security protocol based on BB84 protocol in the internet of things.

31. Secure private cloud using machine learning and cryptography.

32. Trusted and secure e-service based on the durable medium and blockchain technology.

33. A developed cryptographic model based on AES cryptosystem.

34. A new method for medicinal image compression and encryption: Towards remote medicinal diagnosis.

35. An improved two-dimensional image encryption algorithm using Huffman coding and hash function along with chaotic key generation.

36. Modification of RC4 algorithm utilizing the two-state table and initial state factorial.

37. Understanding integer-based fully homomorphic encryption.

38. A modified chaotic image encryption scheme for color image using diagonal pixel confusion and diffusion method.

39. Review of secure the online multimedia data using chaotic map and steganography techniques.

40. Digital color-image encryption scheme based on elliptic curve cryptography ElGamal encryption and 3D Lorenz map.

41. Fibonacci and modulo principle for hiding information using hill cipher algorithm.

42. Pseudorandom byte generator based on shrinking 128-bit chaotic function.

43. Implementation of digital magnitude comparator circuit on memristor crossbar array using memristor-aided logic.

44. Protect sensitive data with lightweight memory encryption.

45. IoT Security with One-Time Pad Secure Algorithm Based on the Double Memory Technique.

46. RSA Cryptosystem with Fuzzy Set Theory for Encryption and Decryption.

47. Multi-Agent Integrated Password Management (MIPM) Application Secured With Encryption.

48. Email Authentication Using Symmetric and Asymmetric Key Algorithm Encryption.

49. The Research of New Type Stratified Water Injection Process Intelligent Measurement Technology.

50. Encrypted Data Inquiries Using Chained Perfect Hashing (CPH).

Catalog

Books, media, physical & digital resources