Search

Your search keyword '"DATA encryption"' showing total 3,361 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
3,361 results on '"DATA encryption"'

Search Results

51. Quantum video encryption based on bitplanes and improved Arnold scrambling.

52. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication.

53. DEVELOPMENT OF HIGH-SPEED ALGORITHM FOR BINOMIAL ARITHMETIC ADDITION.

54. An Evaluation of the User Experience and Privacy Concerns of Individuals Misusing Opioids Using a Location Tracking Mobile Application.

55. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.

56. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

57. High key rate continuous-variable quantum key distribution using telecom optical components.

58. A secure SoC architecture design with dual DMA controllers.

59. IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency.

60. Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access.

61. Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion.

62. Improved secure PCA and LDA algorithms for intelligent computing in IoT‐to‐cloud setting.

63. Multi‐Responsive Afterglows from Aqueous Processable Amorphous Polysaccharide Films.

64. Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard.

65. Amine Gas‐Induced Reversible Optical Bleaching of Bismuth‐Based Lead‐Free Perovskite Thin Films.

66. Pmir: an efficient privacy-preserving medical images search in cloud-assisted scenario.

67. Soft Set Decision and Cluster Percolation Method-Based Policy Clustering and Encryption Optimization for CP-ABE.

68. End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption.

69. Disruption mitigation in the semiconductors supply chain by using public blockchains.

70. Distributed power analysis attack on SM4 encryption chip.

71. Searching across-cohort relatives in 54,092 GWAS samples via encrypted genotype regression.

72. Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique.

73. A New Approach for Enhancing AES-Based Data Encryption Using ECC.

74. Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation.

75. Alkaline: A Simplified Post-Quantum Encryption Algorithm for Classroom Use.

76. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.

77. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.

78. A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication.

79. Generic Vectorial Hologram Based on Simultaneous and Independent Amplitude and Phase Modulation of Orthogonal Polarization States via Single Completely Spin‐Decoupled Meta‐Particles.

80. A fuzzy optimal lightweight convolutional neural network for deduplication detection in cloud server.

81. Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free.

82. Fog computing security using token-based authentication system.

83. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

84. Modifications and improvements to the two fish encryption algorithm: A review.

85. Security architecture and applications: Blockchain perspective.

86. An approach for runtime analysis of 128 bits innovative advanced encryption standard algorithm over triple DES algorithm using VHDL.

87. A novel comparative data security analysis in public auditing for trusted cloud service with SSL encryption over multi-tenancy based access control technique.

88. A novel image retrieval method for encryption and decryption to preserve privacy using AES algorithm and comparing accuracy with DES algorithm.

89. Traffic Classification in an Increasingly Encrypted Web.

90. A learning analytics perspective on educational escape rooms.

91. Reversible Information Storage Based on Rhodamine Derivative in Mechanochromic Cholesteric Liquid Crystalline Elastomer.

92. Twin-field quantum encryption protocol for E-payment based on blockchain.

93. XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era †.

94. On Multiple Encryption for Public-Key Cryptography.

95. A novel deep learning based intrusion detection system for the IoT-Cloud platform with blockchain and data encryption mechanisms.

96. Fully Homomorphic Encryption Scheme for Securing Cloud Data.

97. Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud.

98. Stretchable High-Resolution User-Interactive Synesthesia Displays for Visual-Acoustic Encryption.

99. Enabling Stereochemical Communication and Stimuli‐Responsive Chiroptical Properties in Biphenyl‐Capped Cyclodextrins.

100. Image encryption using binary polarization states of light beam.

Catalog

Books, media, physical & digital resources