Search

Your search keyword '"DATA encryption"' showing total 6,889 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
6,889 results on '"DATA encryption"'

Search Results

151. Efficient Cybersecurity Assessment Using SVM and Fuzzy Evidential Reasoning for Resilient Infrastructure.

152. Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector.

153. JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation.

154. The Vulnerabilities of Electronic Land Certificates and Legal Adaptation in Indonesia's Land Registration System.

155. A SaaS Concept-Based Shopping Center Fire Risk Assessment Model for the Safety Management Applications.

156. Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.

157. Robust optical multi-image encryption with lossless decryption Recovery Based on phase recombination and vector decomposition

158. Hadoop-based secure storage solution for big data in cloud computing environment

159. A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks

160. Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things

161. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.

162. DEVELOPMENT OF HIGH-SPEED ALGORITHM FOR BINOMIAL ARITHMETIC ADDITION.

163. End-to-end security enabled intelligent remote IoT monitoring system.

164. Nucleic-acid-base photofunctional cocrystal for information security and antimicrobial applications.

165. Blue Light-Excited Carbon Dot/C3N4 Nanocomposites with Long-Lived Thermally Activated Delay Fluorescence for Anti-Counterfeiting and Illumination.

166. Image security using steganography and cryptography with sweeping computational ghost imaging.

167. Functional integration of handwritten digit recognition and encryption/decryption based on Pt/GaOx/TiN memristor array for a new data security system.

168. A Method for Designing Substitution Boxes Based on Chaos with High Nonlinearity.

169. A comparative analysis of chaos theory based medical image steganography to enhance data security.

170. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.

171. An Evaluation of the User Experience and Privacy Concerns of Individuals Misusing Opioids Using a Location Tracking Mobile Application.

172. Quantum video encryption based on bitplanes and improved Arnold scrambling.

173. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

174. Brochosome-inspired binary metastructures for pixel-by-pixel thermal signature control.

175. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication.

176. Novel hybrid chaotic map-based secure data transmission between smart meter and HAN devices.

177. Lightweight Secure Compression Scheme for Green IoT Applications.

178. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.

179. Thermally tunable binary-phase VO2 metasurfaces for switchable holography and digital encryption.

180. Electrochromic nanopixels with optical duality for optical encryption applications.

181. A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.

182. Flexible symmetric predicate encryption for data privacy in IoT environments.

183. MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system.

184. Lightweight Structure of Random Key Generation for PRESENT Block Cipher.

185. Data Security in Cloud Environment by Using Hybrid Encryption Technique: A Comprehensive Study on Enhancing Confidentiality and Reliability.

186. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

187. Optimization of data packet encryption algorithm in network link transport layer.

188. Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design.

189. INTERFACE CONTROL AND STATUS MONITORING OF ELECTRONIC INFORMATION EQUIPMENT BASED ON NONLINEAR DATA ENCRYPTION.

190. TO DISTRIBUTE THE ABNORMAL EVENT USING CM-DDS ALGORITHM, WITH SECURELY USING RSA-IVDE ALGORITHM.

191. Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment.

192. A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images.

193. AES-128 reduced-round permutation by replacing the MixColumns function.

194. Enhancing secure multi-group data sharing through integration of IPFS and hyperledger fabric.

195. 基于字典分级和属性加权的密文排序检索方案.

196. Data Interoperability: Addressing the Challenges Placing Quality Healthcare at Risk.

197. Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning.

198. Three-Dimensional Double Random-Phase Encryption for Simultaneous Two-Primary Data.

199. Feature extraction based pixel segmentation techniques data hiding and data encryption.

200. Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard.

Catalog

Books, media, physical & digital resources