Search

Your search keyword '"DATA encryption"' showing total 200 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publisher mdpi Remove constraint Publisher: mdpi
200 results on '"DATA encryption"'

Search Results

1. The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.

2. A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method.

3. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

4. An Efficient Lightweight Authentication Scheme for Smart Meter.

5. Security Analysis of the Symmetric Cryptosystem TinyJambu.

6. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

7. IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency.

8. Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access.

9. End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption.

10. Soft Set Decision and Cluster Percolation Method-Based Policy Clustering and Encryption Optimization for CP-ABE.

11. Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free.

12. Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation.

13. XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era †.

14. On Multiple Encryption for Public-Key Cryptography.

15. Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare.

16. A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.

17. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm.

18. A Survey of Post-Quantum Cryptography: Start of a New Race.

19. The Role of Blockchain in Medical Data Sharing.

20. A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.

21. OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data.

22. Joint Encryption Model Based on a Randomized Autoencoder Neural Network and Coupled Chaos Mapping.

23. Multi-Key Homomorphic Encryption Scheme with Multi-Output Programmable Bootstrapping.

24. Software Defined Networking Architecture for Energy Transaction in Smart Microgrid Systems.

25. Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks.

26. Optimal ElGamal Encryption with Hybrid Deep-Learning-Based Classification on Secure Internet of Things Environment.

27. Inferring Bivariate Polynomials for Homomorphic Encryption Application.

28. Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems.

29. Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes.

30. Anonymous Homomorphic IBE with Application to Anonymous Aggregation.

31. Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment.

32. Blockchain and Machine Learning: A Critical Review on Security.

33. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

34. Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain.

35. Secure Access Control to Data in Off-Chain Storage in Blockchain-Based Consent Systems.

36. A Novel Cipher-Based Data Encryption with Galois Field Theory.

37. The Data Privacy Protection Method for Hyperledger Fabric Based on Trustzone.

38. A New Quantum Private Protocol for Set Intersection Cardinality Based on a Quantum Homomorphic Encryption Scheme for Toffoli Gate.

39. Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors.

40. Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds.

41. Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC.

42. Swarm Intelligence in Internet of Medical Things: A Review.

43. Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine.

44. A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem.

45. A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach.

46. BBNSF: Blockchain-Based Novel Secure Framework Using RP 2 -RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems.

47. AES Based White Box Cryptography in Digital Signature Verification.

48. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.

49. A Blockchain-Based Data Sharing System with Enhanced Auditability.

50. WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations †.

Catalog

Books, media, physical & digital resources