Academic literature on the topic 'Application encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Application encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Application encryption"

1

Ali Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.

Full text
Abstract:
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user duri
APA, Harvard, Vancouver, ISO, and other styles
2

Alzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.

Full text
Abstract:
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entrop
APA, Harvard, Vancouver, ISO, and other styles
3

Atiku, A. U., and D. I. Sajoh. "Signal with Blake2, Chacha20 and Poly1305." advances in multidisciplinary & scientific research journal publication 8, no. 3 (2020): 37–48. http://dx.doi.org/10.22624/aims/maths/v8n3p4.

Full text
Abstract:
Messaging applications are now adopting the concept of end to end encryption. Signal uses the Signal Protocol which has no known vulnerabilities for its end to end encryption. The protocol was explained in this work and possibilities of improvements were explored. It was discovered that the protocol implementation uses the SHA-512 hash, AES in CBC mode for encryption and HMAC for authentication. These Cryptographic Primitives were replaced with more efficient alternatives, Blake2, Chacha20 and Poly1305 respectively. An application was created to test the running time of the proposed cryptograp
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Zhen Liu. "Application Model and Implementation about Team Secrecy Encryption." Advanced Engineering Forum 6-7 (September 2012): 339–42. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.339.

Full text
Abstract:
Personal and network encryption application models nowadays are analyzed in this paper, then a team secrecy encryption application model is proposed based on practical applications. In this model, members of one team have same access authority for electronic documents, and team is the smallest unit of key distribution. Procedures of distribution, transmission and updating key are offline. This model is suitable for co-confidential application among many departments which are loose coupling. An encryption system is implemented based on this model aimed at protecting Microsoft office document.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.

Full text
Abstract:
This paper analyzed the typical architecture of geographic information sharing system based on GML spatial data, pointed out the security risks existed in the network transmission process of the GML spatial data and drawbacks of the existing security transport mechanisms in such a shared system. Further, the paper elaborates on advantages of encrypting the GML data using XML Encryption technology and the encryption process of the GML spatial data. On this basis, the paper gives an application example which encrypts all or part of spatial data in GML documents by the XML Encryption technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Sokouti, Massoud, Ali Zakerolhosseini, and Babak Sokouti. "Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm." Open Medical Informatics Journal 10, no. 1 (2016): 11–22. http://dx.doi.org/10.2174/1874431101610010011.

Full text
Abstract:
Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images over an insecure network, developing a secure encryption algorithm is necessary. Among the three main properties of security services (i.e., confidentiality, integrity, and availability), the confidentiality is the most essential feature for exchanging medical images among physicians. The Goldreich Goldwasser Halevi (GGH) algorithm can be a good choice for encrypting medical images as both the algorithm and sensitive data are represented by numeric matrices. Additiona
APA, Harvard, Vancouver, ISO, and other styles
7

Bachhav, Mr Kiran Ashok. "CAN Encryption for Automotive Application." International Journal for Research in Applied Science and Engineering Technology 8, no. 7 (2020): 112–18. http://dx.doi.org/10.22214/ijraset.2020.7021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Janbee, Shaik Quadar, Reddem Mouneeswari, Viswanadhapalli Bhanuja, and Atmakuri Prashant. "SMS Encryption on Android Application." International Journal of Computer Sciences and Engineering 7, no. 3 (2019): 528–33. http://dx.doi.org/10.26438/ijcse/v7i3.528533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chaudhari, Smita, Samadhan Yangad, Ashish Jha, and Ashish Surwase. ""Geo-Encryption Lite" - A location based Encryption Application for Android." International Journal of Computer Applications 165, no. 4 (2017): 13–17. http://dx.doi.org/10.5120/ijca2017913849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xuan Phuong, Tran Viet, Guomin Yang, Willy Susilo, Fuchun Guo, and Qiong Huang. "Sequence aware functional encryption and its application in searchable encryption." Journal of Information Security and Applications 35 (August 2017): 106–18. http://dx.doi.org/10.1016/j.jisa.2017.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!