Search

Your search keyword '"DATA encryption"' showing total 1,731 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic data security Remove constraint Topic: data security Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
1,731 results on '"DATA encryption"'

Search Results

1. A non-redundant cost-effective platform and data security in cloud computing using improved lightweight standalone framework over data encryption standard algorithm.

2. Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks.

3. Residue Number System Based S-box Generation and its Applications in AES for Image Encryption.

4. An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data.

5. Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance.

6. Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy.

7. A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.

8. Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation.

9. Lightweight Information-Sharing System with Access Control in Disaster Management with Security against Dishonest Users.

10. SECURE ENCRYPTED TRANSMISSION OF NETWORK DATA IN CLOUD COMPUTING TECHNOLOGY ENVIRONMENT.

11. “Implementing a Secure Mobile Application for Cardless Transactions using QR Code and Hybrid AES-ECC Encryption”.

12. A data security model for internet of things applications.

14. Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach.

15. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

16. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System.

17. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

18. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

19. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

20. Privacy-Preserving Confidential Reporting System With Designated Reporters.

21. AN ADAPTIVE ELLIPTICAL CURVE CRYPTOGRAPHY-RIVEST-SHAMIR-ADLEMAN-BASED ENCRYPTION FOR IoT HEALTHCARE SECURITY MODEL WITH BLOCKCHAIN TECHNOLOGY.

22. Constructive approach and randomization of a two-parameter chaos system for securing data.

23. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.

24. A combination of hill cipher and RC4 methods for text security.

25. The Vulnerabilities of Electronic Land Certificates and Legal Adaptation in Indonesia's Land Registration System.

26. Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.

27. Unlocking the Potential of Fully Homomorphic Encryption: Exploring the transformational potential of FHE and the path toward adoption of its "stack".

28. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.

29. End-to-end security enabled intelligent remote IoT monitoring system.

30. Image security using steganography and cryptography with sweeping computational ghost imaging.

31. Functional integration of handwritten digit recognition and encryption/decryption based on Pt/GaOx/TiN memristor array for a new data security system.

32. A comparative analysis of chaos theory based medical image steganography to enhance data security.

33. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.

34. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication.

35. Lightweight Secure Compression Scheme for Green IoT Applications.

36. A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.

37. MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system.

38. Data Security in Cloud Environment by Using Hybrid Encryption Technique: A Comprehensive Study on Enhancing Confidentiality and Reliability.

39. Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design.

40. A secure SoC architecture design with dual DMA controllers.

41. Advancing Cloud Image Security via AES Algorithm Enhancement Techniques.

42. A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud.

43. Distributed power analysis attack on SM4 encryption chip.

44. Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique.

45. Efficient time-oriented latency-based secure data encryption for cloud storage.

46. Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.

47. An In-Depth Analysis of Steganography Techniques: From Classical Edge Detection to Adaptive Approaches.

48. Modifications and improvements to the two fish encryption algorithm: A review.

49. A novel comparative data security analysis in public auditing for trusted cloud service with SSL encryption over multi-tenancy based access control technique.

50. Hopewind launched hopeCloud 4.0 to revolutionize future energy management.

Catalog

Books, media, physical & digital resources