Search

Your search keyword '"DATA encryption"' showing total 541 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publisher mdpi Remove constraint Publisher: mdpi
541 results on '"DATA encryption"'

Search Results

1. Some Properties and Algorithms for Twin Primes.

2. ShinyAnonymizer Enhanced Version and Beyond: A Further Exploration of Privacy-Preserving Solutions in Health Data Management †.

3. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations.

4. Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy.

5. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

6. Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation.

7. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

8. Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control.

9. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

10. Physical Layer Encryption for CO-OFDM Systems Enabled by Camera Projection Scrambler.

11. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

12. Fractal Tent Map with Application to Surrogate Testing.

13. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System.

14. QUMA: Quantum Unified Medical Architecture Using Blockchain.

15. IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets.

16. Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach.

17. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System.

18. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.

19. Secure and Scalable Internet of Things Model Using Post-Quantum MACsec.

20. A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method.

21. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

22. Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.

23. The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.

24. Inference Analysis of Video Quality of Experience in Relation with Face Emotion, Video Advertisement, and ITU-T P.1203.

25. An Efficient Lightweight Authentication Scheme for Smart Meter.

26. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.

27. Security Analysis of the Symmetric Cryptosystem TinyJambu.

28. Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector.

29. Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.

30. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

31. Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design.

32. Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning.

33. Three-Dimensional Double Random-Phase Encryption for Simultaneous Two-Primary Data.

34. IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency.

35. Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access.

36. End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption.

37. Soft Set Decision and Cluster Percolation Method-Based Policy Clustering and Encryption Optimization for CP-ABE.

38. A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates.

39. Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation.

40. Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free.

41. Secure Collaborative Computing for Linear Regression.

42. A Data Hierarchical Encryption Scheme Based on Attribute Hiding under Multiple Authorization Centers.

43. Security Protection of 3D Models of Oblique Photography by Digital Watermarking and Data Encryption.

44. Secure Control of Linear Controllers Using Fully Homomorphic Encryption.

45. XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era †.

46. On Multiple Encryption for Public-Key Cryptography.

47. Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (2 32)) and High Irreducible Polynomials.

48. Dynamics of Semiconductor Laser Coupled with Two External Cavities.

49. A Comparative Analysis of VirLock and Bacteriophage ϕ 6 through the Lens of Game Theory.

50. Advancing Complexity Research in Earth Sciences and Geography.

Catalog

Books, media, physical & digital resources