Search

Your search keyword '"DATA encryption"' showing total 7,386 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publisher springer nature Remove constraint Publisher: springer nature
7,386 results on '"DATA encryption"'

Search Results

1. Quantum circuit implementations of lightweight authenticated encryption ASCON.

2. Integrating the edge computing paradigm into the development of IoT forensic methodologies.

3. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

4. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.

5. Nucleic-acid-base photofunctional cocrystal for information security and antimicrobial applications.

6. A Method for Designing Substitution Boxes Based on Chaos with High Nonlinearity.

7. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.

8. Quantum video encryption based on bitplanes and improved Arnold scrambling.

9. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication.

10. A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.

11. Flexible symmetric predicate encryption for data privacy in IoT environments.

12. MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system.

13. Feature extraction based pixel segmentation techniques data hiding and data encryption.

14. Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard.

15. Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion.

16. Pmir: an efficient privacy-preserving medical images search in cloud-assisted scenario.

17. Disruption mitigation in the semiconductors supply chain by using public blockchains.

18. Distributed power analysis attack on SM4 encryption chip.

19. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud.

20. Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.

21. A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication.

22. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform.

23. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.

24. Twin-field quantum encryption protocol for E-payment based on blockchain.

25. Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud.

26. Image encryption using binary polarization states of light beam.

27. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing.

28. Medical Image Encryption using Biometric Image Texture Fusion.

29. Quantum Private Comparison Protocol Based on Multiple GHZ States in Cross-domain Environment.

30. Analytical soliton solutions for the (2 + 1)-perturbed and higher order cubic–quintic nonlinear Schrödinger equations.

31. A data compression and encryption method for green edge computing.

32. Reversible encryption and lossless data hiding for medical imaging aiding smart health care.

33. Quantum authentication method based on key-controlled maximally mixed quantum state encryption.

34. Quantum key recovery attacks on tweakable Even–Mansour ciphers.

35. Design of area, energy and security optimized reversible architectures for digital image cryptography.

36. Polynomial cryptographic optical steganography substitution model for the telehealth system with multimedia data.

37. Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique.

38. Joint optimisation of drone routing and battery wear for sustainable supply chain development: a mixed-integer programming model based on blockchain-enabled fleet sharing.

39. A typology of secure multicast communication over 5 G/6 G networks.

40. An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of "Traffic Engineering".

41. Authorization and privacy preservation in cloud-based distributed ehr system using blockchain technology and anonymous digital ring signature.

42. S-DAC: A Novel Dynamic Substitution boxes using hybrid chaotic system and Deoxyribonuceic Acid(DNA) coding for counterfeiting Side-Channel Attacks.

43. A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment.

44. The current state and future of mobile security in the light of the recent mobile security threat reports.

45. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment.

46. Secured two factor authentication, graph based replication and encryption strategy in cloud computing.

47. Random fractal-enabled physical unclonable functions with dynamic AI authentication.

48. Design of ChaApache framework for securing Hadoop application in big data.

49. An efficient steganography technique based on S2OA & DESAE model.

50. A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol.

Catalog

Books, media, physical & digital resources