Search

Your search keyword '"DATA encryption"' showing total 2,463 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
2,463 results on '"DATA encryption"'

Search Results

1. Improved RSA with Enhanced Security on STM32 @ 84MHz.

2. Functionalized tails influence photoluminescence emissions for advanced applications in the fiel of time-resolved information input and erasure.

3. Achieving Seconds‐to‐Hours Duration‐Tunable Organic Long Persistent Luminescence from Carbon Dots‐Based Exciplex Systems by Energy Gaps Regulation†.

4. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System.

5. Leveraging chaos for enhancing encryption and compression in large cloud data transfers.

6. Will sentiment analysis need subculture? A new data augmentation approach.

7. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile.

8. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.

9. Quantum circuit implementations of lightweight authenticated encryption ASCON.

10. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

11. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

12. Privacy-Preserving Confidential Reporting System With Designated Reporters.

13. Kth min Threshold Encryption for Privacy-preserving Data Evaluation.

14. Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics.

15. AN ADAPTIVE ELLIPTICAL CURVE CRYPTOGRAPHY-RIVEST-SHAMIR-ADLEMAN-BASED ENCRYPTION FOR IoT HEALTHCARE SECURITY MODEL WITH BLOCKCHAIN TECHNOLOGY.

16. Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.

17. Sparse Compression-Based Image Encryption using Data Encryption Standards RC5.

18. Synchronously Thermochromic and Shape‐Shifting Liquid Crystal Elastomers Enabled by Hierarchical Structure Control for Multidimensional Encryption.

19. Modulation of Excimer Formation and Photoexcitation Behaviour through DNA‐Surfactant‐Dye Supramolecular Assembly.

20. A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method.

21. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

22. Multilevel Information Encryption Mediated by Reconfigurable Thermal Emission in Smart Bilayer Material.

23. The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.

24. APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization.

25. Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.

26. An Efficient Lightweight Authentication Scheme for Smart Meter.

27. Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.

28. A Modified AES-512 Bits Algorithm for Data Encryption.

29. Hybrid optimization enabled secure privacy preserved data sharing based on blockchain.

30. Construction of a network intelligence platform for privacy protection and integrated big data mining.

31. E2EE enhanced patient-centric blockchain-based system for EHR management.

32. Novel true random bit generation and its audio encryption application with Lorenz chaotic circuit-based entropy source.

33. Integrating the edge computing paradigm into the development of IoT forensic methodologies.

34. Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model.

35. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

36. Security Analysis of the Symmetric Cryptosystem TinyJambu.

37. A combination of hill cipher and RC4 methods for text security.

38. Enhancing the performance of network in wireless body area network based on novel encryption algorithm.

39. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.

40. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.

41. Functional integration of handwritten digit recognition and encryption/decryption based on Pt/GaOx/TiN memristor array for a new data security system.

42. Brochosome-inspired binary metastructures for pixel-by-pixel thermal signature control.

43. Novel hybrid chaotic map-based secure data transmission between smart meter and HAN devices.

44. Quantum video encryption based on bitplanes and improved Arnold scrambling.

45. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication.

46. DEVELOPMENT OF HIGH-SPEED ALGORITHM FOR BINOMIAL ARITHMETIC ADDITION.

47. An Evaluation of the User Experience and Privacy Concerns of Individuals Misusing Opioids Using a Location Tracking Mobile Application.

48. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.

49. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

50. High key rate continuous-variable quantum key distribution using telecom optical components.

Catalog

Books, media, physical & digital resources