Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Encryption techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Encryption techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Encryption techniques"
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Der volle Inhalt der QuelleRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Der volle Inhalt der QuelleThirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Der volle Inhalt der QuelleLi, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.
Der volle Inhalt der QuelleAnsari, Tasin Habib Ahmad* Dr. J. W. Bakal. "ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 11 (2016): 83–91. https://doi.org/10.5281/zenodo.164906.
Der volle Inhalt der QuelleParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Der volle Inhalt der QuelleSharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Der volle Inhalt der QuelleVaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.
Der volle Inhalt der QuelleYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Der volle Inhalt der QuelleLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Der volle Inhalt der QuelleDissertationen zum Thema "Encryption techniques"
Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Der volle Inhalt der QuelleDutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Der volle Inhalt der QuelleKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Der volle Inhalt der QuelleTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Der volle Inhalt der QuelleChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Der volle Inhalt der QuelleChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Der volle Inhalt der QuelleJha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Der volle Inhalt der QuelleWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Der volle Inhalt der QuelleBrisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Der volle Inhalt der QuelleGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Der volle Inhalt der QuelleBücher zum Thema "Encryption techniques"
Held, Gilbert. Top secret data encryption techniques. Sams Pub., 1993.
Den vollen Inhalt der Quelle findenLian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.
Den vollen Inhalt der Quelle findenHeld, Gilbert. Learn encryption techniques with BASIC and C++. Wordware Pub., 1999.
Den vollen Inhalt der Quelle findenBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Den vollen Inhalt der Quelle findenGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford Brookes University, 2003.
Den vollen Inhalt der Quelle findenSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.
Den vollen Inhalt der Quelle findenShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Taylor & Francis, 2008.
Den vollen Inhalt der Quelle findenS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. SPIE, 2004.
Den vollen Inhalt der Quelle findenWold, Geoffrey H. Computer crime: Techniques, prevention. Bankers Pub. Co., 1989.
Den vollen Inhalt der Quelle findenEUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Springer, 2000.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Encryption techniques"
Yi, Xun, Xuechao Yang, Xiaoning Liu, et al. "Homomorphic Encryption." In Privacy Enhancing Techniques. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-95140-4_2.
Der volle Inhalt der QuelleAlbrecht, Martin, and Carlos Cid. "Algebraic Techniques in Differential Cryptanalysis." In Fast Software Encryption. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9_12.
Der volle Inhalt der QuelleGautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Der volle Inhalt der QuelleGautam, Tanvi, Aditya Thakkar, and Nitish Pathak. "Attribute-Based Encryption." In Emerging Security Algorithms and Techniques. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-11.
Der volle Inhalt der QuelleGouget, Aline, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, and Chris Mitchell. "Analysis of the Bit-Search Generator and Sequence Compression Techniques." In Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_13.
Der volle Inhalt der QuelleThanki, Rohit M. "Audio Watermarking with Encryption." In Advanced Techniques for Audio Watermarking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24186-5_5.
Der volle Inhalt der QuelleDinur, Itai, Orr Dunkelman, Nathan Keller, and Adi Shamir. "Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64." In Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_20.
Der volle Inhalt der QuelleLu, Rongxing. "Homomorphic Public Key Encryption Techniques." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32899-7_2.
Der volle Inhalt der QuelleRajendiran, M., B. Syed Ibrahim, R. Pratheesh, and C. Nelson Kennnedy Babu. "Multilanguage Based SMS Encryption Techniques." In Advances in Intelligent Systems and Computing. Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_55.
Der volle Inhalt der QuelleMishra, Prasanna Raghaw, Indivar Gupta, and Navneet Gaba. "Cryptanalysis of Multilanguage Encryption Techniques." In Mathematics and Computing 2013. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1952-1_2.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Encryption techniques"
Abughali, Heba A. M., and Utku Kose. "Image Encryption Techniques: A Survey." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847281.
Der volle Inhalt der QuelleK, Megala, Jayadevi J, Keerthika K, Manikandan G, Vijay Sai R, and Srinivasan B. "Secure Medical Image Encryption Using Homomorphic Techniques." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690754.
Der volle Inhalt der QuelleKhare, Shanu, Navjot Singh Talwandi, Payal Thakur, Rakesh Thakur, Bhavana Bansal, and Kalpana Singh. "Brain-Inspired Encryption Techniques for Medical Imaging." In 2024 IEEE Silchar Subsection Conference (SILCON). IEEE, 2024. https://doi.org/10.1109/silcon63976.2024.10910555.
Der volle Inhalt der QuelleChidambaranathan, Senthilnathan, M. Santhanaraj, E. Ajitha, Syed Fiaz A. S, Suchithra B, and T. Kathirvel. "Automated Detection of Encryption Algorithms Using AI Techniques." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823274.
Der volle Inhalt der QuelleGupta, Ambika, Suyel Namasudra, and Prabhat Kumar. "Securing the Cloud “Advanced Techniques in Data Encryption”." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983278.
Der volle Inhalt der QuellePatel, Advait, Hariharan Ragothaman, Milavkumar Shah, et al. "AI-Powered Data Encryption Techniques: Safeguarding Cloud Infrastructure." In 2025 IEEE Conference on Artificial Intelligence (CAI). IEEE, 2025. https://doi.org/10.1109/cai64502.2025.00153.
Der volle Inhalt der QuelleMageshwaran, M. K., and P. Sri Ramya. "Data Protection in the Era of Big Data Advanced Encryption Standard VS Data Encryption Standard." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877503.
Der volle Inhalt der QuelleGhosh, Shithan, Sanjukta Mondal, Arnab Laha, Bishakha Mondal, Atri Bandyopadhyay, and Prasun Chakraborty. "Enhancing E-commerce Recommendation Systems Through Advanced Encryption Techniques." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724864.
Der volle Inhalt der QuelleTahami, Syed Zoubaid, Maria Ashraf, Anila Saghir, and Madiha Abbasi. "Performance Analysis of Popular Encryption Techniques for Mobile Applications." In 2024 Global Conference on Wireless and Optical Technologies (GCWOT). IEEE, 2024. https://doi.org/10.1109/gcwot63882.2024.10805643.
Der volle Inhalt der QuelleShang, Jun, Hanwen Zhang, Weixiong Rao, and Yiguang Hong. "Linear Encryption Techniques for Counteracting Information-based Stealthy Attacks." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821578.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Encryption techniques"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Der volle Inhalt der QuelleRannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, 2021. http://dx.doi.org/10.21248/gups.63413.
Der volle Inhalt der Quelle