Search

Your search keyword '"DATA encryption"' showing total 215 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic algorithms Remove constraint Topic: algorithms Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
215 results on '"DATA encryption"'

Search Results

1. Enhancing the performance of network in wireless body area network based on novel encryption algorithm.

2. Enhancement of KASUMI algorithm by adding hamming code.

3. An innovative approach for runtime analysis of 128 bits AES algorithm by comparing with DES algorithm using VHDL.

4. Improved secure PCA and LDA algorithms for intelligent computing in IoT‐to‐cloud setting.

5. A New Approach for Enhancing AES-Based Data Encryption Using ECC.

6. Alkaline: A Simplified Post-Quantum Encryption Algorithm for Classroom Use.

7. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

8. Modifications and improvements to the two fish encryption algorithm: A review.

9. An approach for runtime analysis of 128 bits innovative advanced encryption standard algorithm over triple DES algorithm using VHDL.

10. A novel image retrieval method for encryption and decryption to preserve privacy using AES algorithm and comparing accuracy with DES algorithm.

11. Medical Image Encryption using Biometric Image Texture Fusion.

12. A double encryption protection algorithm for stem cell bank privacy data based on improved AES and chaotic encryption technology.

13. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm.

14. 一种嵌入式设备固件安全更新方案.

15. Algoritmos del cifrado para protección de datos biométricos.

16. Threshold multiparty multi‐randomness secure partially homomorphic encryption for data security in cloud.

17. Authorization and privacy preservation in cloud-based distributed ehr system using blockchain technology and anonymous digital ring signature.

18. تولید کلید رمزنگاری تصادفی بیومتریک براساس ویژگی های منحصربه فرد اثر انگشت

19. Performance Analysis of Encryption Capabilities of ARM-based Single Board Microcomput.

20. Blockchain and Machine Learning: A Critical Review on Security.

21. A developed cryptographic model based on AES cryptosystem.

22. An improved two-dimensional image encryption algorithm using Huffman coding and hash function along with chaotic key generation.

23. The Long Road Ahead to Transition to Post-Quantum Cryptography: Anticipating the output of the competition for new cryptographic algorithms.

24. Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data.

25. Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm.

26. Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm.

27. MODELLING THE INTERWOVEN PARALLEL TESTING PROCESS IN THE AUTOMOTIVE INDUSTRY.

28. DESIGN OF AN ACTIVE THERMAL ELEMENT FOR A SOLAR THERMAL ENERGY MEASUREMENT SYSTEM BY SIMULATING HEAT TRANSFER PROCESSES USING THE FINITE ELEMENT METHOD.

29. DEVELOPMENT AND APPLICATION OF BLADE INSPECTION SYSTEM BASED ON MULTI-OPTICAL SENSOR FUSION.

30. RESEARCH ON THE DIAGNOSIS OF DISTRIBUTION NETWORK FAULT DATA USING A FAULT PREDICTION MODEL.

31. ROBOTIC ARMS PASSING THROUGH OBSTACLE NODES: USING AN IMPROVED INTELLIGENT ALGORITHM.

32. A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT.

33. Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud.

34. Research on cloud data encryption algorithm based on bidirectional activation neural network.

35. Research on cloud data encryption algorithm based on bidirectional activation neural network.

36. Modification of RC4 algorithm utilizing the two-state table and initial state factorial.

37. Benchmarking of lightweight cryptographic algorithms for wireless IoT networks.

38. Algorithm substitution attacks against receivers.

39. No Need to Ask: Creating Permissionless Blockchains of Metadata Records.

40. 基于异构可重构计算的 AES 加密系统研究.

41. Fingerprint image encryption based on chaos and nonlinear dynamic "X" model diffusion.

42. An Ultra-Fast Authenticated Encryption Scheme with Associated Data Using AES-OTR.

43. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids.

44. Localized State-Change Consensus in Immense and Highly Dynamic Environments.

45. Performance and Integration of Smartphone Wireless ECG Monitoring into the Enterprise Electronic Health Record: First Clinical Experience.

46. Modified Advanced Encryption Standard for Boost Image Encryption.

47. A fusion data security protection scheme for sensitive E-documents in the open network environment.

48. Enhancing Security in Digital Data using various Function of S-box in Data Encryption Standard Method.

49. Smart contract-based secure cooperative spectrum sensing algorithm.

50. Colour image encryption based on customized neural network and DNA encoding.

Catalog

Books, media, physical & digital resources