Search

Your search keyword '"DATA encryption"' showing total 6,889 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
6,889 results on '"DATA encryption"'

Search Results

1. Secure Virtual Machine Migration and Host Overload Detection Using Modified Pelican Optimization with Variable Load Mean Function.

2. Beyond neural data: Cognitive biometrics and mental privacy.

3. Technical principles and protocols of encryption and their significance and effects on technology regulation.

4. Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks.

5. A novel AES–DES with improved Cheetah optimisation algorithm for secured medical data transmission in cloud environment.

6. Predefined‐time tracking control of multiplicative systems.

7. Residue Number System Based S-box Generation and its Applications in AES for Image Encryption.

8. Enhancing privacy and security in IoT-based smart grid system using encryption-based fog computing.

9. Some Properties and Algorithms for Twin Primes.

10. Blockchain and Cryptography Framework of E-Apps with Big Data.

11. Digital Assistant for Pharmacists Using Indonesian Language Based on Rules and Artificial Intelligence.

12. Multiple Color Image Encryption System Based on Hybrid Digital/Optical Techniques and Assisted by 18D Memristive Chaos.

13. Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications.

14. Reversible Hydro/Halochromic Electrospun Textiles: Harnessing Chromic Technologies in Wearables for Anti‐Counterfeiting Applications.

15. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

16. A Structured Lightweight Encryption Architecture for Data Protection in IoT.

17. Demonstration of microwave single-shot quantum key distribution.

18. A Study on AG-Groups in Spherical Fuzzy Environment.

19. Chiral Self‐Discrimination Induced Luminescence Vapochromism of Binaphthol Imides for Anti‐Counterfeiting and Data Encryption.

20. Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes.

21. Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack.

22. A COMPARATIVE ANALYSIS OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST-SHAMIR-ADLEMAN (RSA) ALGORITHM: MATHEMATICAL, ALGORITHMIC, AND PERFORMANCE COMPARISON.

23. ShinyAnonymizer Enhanced Version and Beyond: A Further Exploration of Privacy-Preserving Solutions in Health Data Management †.

24. An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data.

25. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations.

26. Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries.

27. Some Remarks on Cocks' Identity-Based Encryption Scheme.

28. Lightweight Pseudo Random Number Generator for Embedded Systems.

29. A Ransomware Early Detection Model based on an Enhanced Joint Mutual Information Feature Selection Method.

30. Organizations' readiness for insider attacks: A process‐oriented approach.

31. Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance.

32. Hybrid encryption based on a generative adversarial network.

33. Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures.

34. Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy.

35. Stochastic switching and analog-state programmable memristor and its utilization for homomorphic encryption hardware.

36. A local encryption method for large-scale vector maps based on spatial hierarchical index and 4D hyperchaotic system.

37. Dynamically Securing the Data by 1O2 Sensitization of Fluorescent Composites with a High Latency and Uncrackable Features.

38. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

39. Bi3+/Eu3+ Co‐Activated Multimode Anti‐Counterfeiting Material with White Light Emission and Orange‐Yellow Persistent Luminescence.

40. Supply chain management with secured data transmission via improved DNA cryptosystem.

41. A novel authentication scheme for secure data sharing in IoT enabled agriculture.

42. A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.

43. HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern.

44. Optical image encryption and authentication scheme with computational ghost imaging.

45. Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation.

46. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

47. SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol.

48. Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions.

49. Streaming traffic classification: a hybrid deep learning and big data approach.

50. CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification.

Catalog

Books, media, physical & digital resources