Zeitschriftenartikel zum Thema „Encryption techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Encryption techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Der volle Inhalt der QuelleRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Der volle Inhalt der QuelleThirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Der volle Inhalt der QuelleLi, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.
Der volle Inhalt der QuelleAnsari, Tasin Habib Ahmad* Dr. J. W. Bakal. "ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 11 (2016): 83–91. https://doi.org/10.5281/zenodo.164906.
Der volle Inhalt der QuelleParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Der volle Inhalt der QuelleSharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Der volle Inhalt der QuelleVaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.
Der volle Inhalt der QuelleYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Der volle Inhalt der QuelleLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Der volle Inhalt der QuelleThabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Der volle Inhalt der QuelleYang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Der volle Inhalt der QuelleIsidhore, Smitty V. "Modern Cryptosystems for Color Image Encryption: Insights and Future Directions." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02918.
Der volle Inhalt der QuelleAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Der volle Inhalt der QuelleMohammed, Zahraa A., Hadeel Qasem Gheni, Zahraa Jabbar Hussein, and Ali Kadhum M. Al-Qurabat. "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques." Engineering, Technology & Applied Science Research 14, no. 1 (2024): 12694–701. http://dx.doi.org/10.48084/etasr.6601.
Der volle Inhalt der QuelleZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Der volle Inhalt der QuelleWedad Abdul Khuder Naser, Amal Abbas Kadhim, and Safana Hyder Abbas. "Subject review: Image encryption techniques." Global Journal of Engineering and Technology Advances 15, no. 3 (2023): 029–31. http://dx.doi.org/10.30574/gjeta.2023.15.3.0098.
Der volle Inhalt der QuelleWedad, Abdul Khuder Naser, Abbas Kadhim Amal, and Hyder Abbas Safana. "Subject review: Image encryption techniques." Global Journal of Engineering and Technology Advances 16, no. 1 (2023): 029–31. https://doi.org/10.5281/zenodo.8275766.
Der volle Inhalt der QuelleFarhan, Mohammed Mahmoud. "Image Authentication Using Public Key." Al-Salam Journal for Engineering and Technology 4, no. 1 (2024): 78–87. http://dx.doi.org/10.55145/ajest.2025.04.01.007.
Der volle Inhalt der QuelleAnnadurai, Narmadha, and Agusthiyar Ramu. "Bolstering image encryption techniques with blockchain technology - a systematic review." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 2 (2025): 594. https://doi.org/10.11591/ijict.v14i2.pp594-604.
Der volle Inhalt der QuellePushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.
Der volle Inhalt der QuelleDr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.
Der volle Inhalt der QuelleEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Der volle Inhalt der QuelleJoshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, and Dragan Peraković. "A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.
Der volle Inhalt der QuelleAl-khafaji, Baydaa-Jaffer. "An approach for encrypting images using a four-dimensional logistic map." Wasit Journal for Pure sciences 3, no. 2 (2024): 140–45. http://dx.doi.org/10.31185/wjps.343.
Der volle Inhalt der QuelleKaur, Mandeep, Surender Singh, and Manjit Kaur. "Computational Image Encryption Techniques: A Comprehensive Review." Mathematical Problems in Engineering 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/5012496.
Der volle Inhalt der QuelleKumar, Brijesh, and Amrita Saraswat. "Security on Cloud using High Level Encryption Techniques." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (2017): 915–18. http://dx.doi.org/10.31142/ijtsrd4712.
Der volle Inhalt der QuelleSelvi, J. Helen Arokia, and T. Rajendran. "DNA Encoding and Chaos based Image Encryption Technique for Cloud Storage and Communications." Indian Journal Of Science And Technology 18, no. 9 (2025): 734–44. https://doi.org/10.17485/ijst/v18i9.3557.
Der volle Inhalt der QuelleMahna, Shivanku, and Sravan Ch. "Data Encryption Techniques for USB." International Journal of Computer Applications 104, no. 7 (2014): 14–17. http://dx.doi.org/10.5120/18213-9162.
Der volle Inhalt der QuelleSIROMONEY, RANI, K. G. SUBRAMANIAN, and P. J. ABISHA. "ENCRYPTION-DECRYPTION TECHNIQUES FOR PICTURES." International Journal of Pattern Recognition and Artificial Intelligence 03, no. 03n04 (1989): 497–503. http://dx.doi.org/10.1142/s0218001489000371.
Der volle Inhalt der QuelleVasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.
Der volle Inhalt der QuelleRanjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal, and Surendra Shetty. "A Survey on Key(s) and Keyless Image Encryption Techniques." Cybernetics and Information Technologies 17, no. 4 (2017): 134–64. http://dx.doi.org/10.1515/cait-2017-0046.
Der volle Inhalt der QuelleAdeyemi Afolayan Adesola, Awele Mary-rose Ilusanmi, and Peter Chimee. "A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 1916–24. https://doi.org/10.30574/wjarr.2025.25.2.0434.
Der volle Inhalt der QuelleDr.R.Premkumar., Dr.C.Priya., S.Vengatesh Kumar.,, Dr M. Vidhyalakshmi &. Dr S. Saranya;. "Investigation on Image Encryption Using Chaos Based Techniques." International Journal for Modern Trends in Science and Technology 7, no. 05 (2021): 147–53. http://dx.doi.org/10.46501/ijmtst0705025.
Der volle Inhalt der QuelleS, Murugesan, S. Ashok Kumar, Tamilselvi K, and Thiyagarajan T. "PRIVACY-PRESERVING TECHNIQUES IN BIG DATA AND INFORMATION SECURITY." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3320–24. http://dx.doi.org/10.21917/ijct.2024.0493.
Der volle Inhalt der QuelleAlauldeen Al-Bayati, Hajir, Lahieb M. Jawad, and Dalal N. Hamod. "Exploring Visual Cryptography Techniques: A Comprehensive Review." Al-Nahrain Journal of Science 27, no. 3 (2024): 97–108. https://doi.org/10.22401/anjs.27.3.12.
Der volle Inhalt der QuelleParthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.
Der volle Inhalt der QuelleNamdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.
Der volle Inhalt der QuelleAbdulbaqi, et. al., Azmi Shawkat. "Exploring the potential of offline cryptography techniques for securing ECG signals in healthcare." Periodicals of Engineering and Natural Sciences (PEN) 11, no. 3 (2023): 148–54. https://doi.org/10.21533/pen.v11.i3.142.
Der volle Inhalt der QuelleJameel, Enas Ali, and Sameera Abbas Fadhel. "Digital Image Encryption Techniques: Article Review." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 2 (2022): 24–35. http://dx.doi.org/10.47577/technium.v4i2.6026.
Der volle Inhalt der QuelleSimkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques." AIS Educator Journal 1, no. 1 (2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.
Der volle Inhalt der QuelleSubramanian N., Dr Venkata, and Dr Shankar Sriram V S. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.b1032.14020125.
Der volle Inhalt der QuelleDr., Venkata Subramanian N. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.B1032.14020125.
Der volle Inhalt der QuelleOmolara Patricia Olaiya, Temitayo Oluwadamilola Adesoga, Azeez Adekunle Adebayo, Fehintola Moyosore Sotomi, Oluwaseun Aaron Adigun, and Paschal M Ezeliora. "Encryption techniques for financial data security in fintech applications." International Journal of Science and Research Archive 12, no. 1 (2024): 2942–49. http://dx.doi.org/10.30574/ijsra.2024.12.1.1210.
Der volle Inhalt der QuelleAbu Zitar, Raed, and Muhammed J. Al-Muhammed. "Hybrid encryption technique: Integrating the neural network with distortion techniques." PLOS ONE 17, no. 9 (2022): e0274947. http://dx.doi.org/10.1371/journal.pone.0274947.
Der volle Inhalt der QuelleGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Der volle Inhalt der QuellePrashant, MD Sohail Haque, Amrinder Kaur, and Pankaj Yadav. "Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 565–74. http://dx.doi.org/10.32628/cseit2410263.
Der volle Inhalt der QuelleAl-Fayoumi, Mustafa A., Ammar Odeh, Ismail Keshta, and Ashraf Ahmad. "Techniques of medical image encryption taxonomy." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 1990–97. http://dx.doi.org/10.11591/eei.v11i4.3850.
Der volle Inhalt der QuelleMustafa, A. Al-Fayoumi, Odeh Ammar, Keshta Ismail, and Ahmad Ashraf. "Techniques of medical image encryption taxonomy." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 1990~1997. https://doi.org/10.11591/eei.v11i4.3850.
Der volle Inhalt der QuelleM, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.
Der volle Inhalt der Quelle