Journal articles on the topic 'Application encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Application encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ali Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Full textAlzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.
Full textAtiku, A. U., and D. I. Sajoh. "Signal with Blake2, Chacha20 and Poly1305." advances in multidisciplinary & scientific research journal publication 8, no. 3 (2020): 37–48. http://dx.doi.org/10.22624/aims/maths/v8n3p4.
Full textZhou, Zhen Liu. "Application Model and Implementation about Team Secrecy Encryption." Advanced Engineering Forum 6-7 (September 2012): 339–42. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.339.
Full textLi, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.
Full textSokouti, Massoud, Ali Zakerolhosseini, and Babak Sokouti. "Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm." Open Medical Informatics Journal 10, no. 1 (2016): 11–22. http://dx.doi.org/10.2174/1874431101610010011.
Full textBachhav, Mr Kiran Ashok. "CAN Encryption for Automotive Application." International Journal for Research in Applied Science and Engineering Technology 8, no. 7 (2020): 112–18. http://dx.doi.org/10.22214/ijraset.2020.7021.
Full textJanbee, Shaik Quadar, Reddem Mouneeswari, Viswanadhapalli Bhanuja, and Atmakuri Prashant. "SMS Encryption on Android Application." International Journal of Computer Sciences and Engineering 7, no. 3 (2019): 528–33. http://dx.doi.org/10.26438/ijcse/v7i3.528533.
Full textChaudhari, Smita, Samadhan Yangad, Ashish Jha, and Ashish Surwase. ""Geo-Encryption Lite" - A location based Encryption Application for Android." International Journal of Computer Applications 165, no. 4 (2017): 13–17. http://dx.doi.org/10.5120/ijca2017913849.
Full textXuan Phuong, Tran Viet, Guomin Yang, Willy Susilo, Fuchun Guo, and Qiong Huang. "Sequence aware functional encryption and its application in searchable encryption." Journal of Information Security and Applications 35 (August 2017): 106–18. http://dx.doi.org/10.1016/j.jisa.2017.06.002.
Full textRanjan, Kumar H. S., Safeeriya S. P. Fathimath, Ganesh Aithal, and Surendra Shetty. "A Survey on Key(s) and Keyless Image Encryption Techniques." Cybernetics and Information Technologies 17, no. 4 (2017): 134–64. http://dx.doi.org/10.1515/cait-2017-0046.
Full textZhao, De Fu. "Study on Encryption Technology Concept and the Application of Encryption Method." Advanced Materials Research 1079-1080 (December 2014): 776–78. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.776.
Full textLiu, Chang Ming, and Yan Jun Sun. "The Application of Data Encryption in Network Security." Applied Mechanics and Materials 513-517 (February 2014): 549–51. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.549.
Full textHusni, Emir. "Dynamic Rule Encryption for Mobile Payment." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/4975302.
Full textHussain, Iqtadar, Tariq Shah, Muhammad Asif Gondal, and Hasan Mahmood. "Analysis of S-box in Image Encryption Using Root Mean Square Error Method." Zeitschrift für Naturforschung A 67, no. 6-7 (2012): 327–32. http://dx.doi.org/10.5560/zna.2012-0023.
Full textHuang, Bao Hua, Tian Jing Wang, Yan Ma, and Feng Jiang. "Encrypting Database Content with User-Defined Function." Applied Mechanics and Materials 543-547 (March 2014): 3203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3203.
Full textBwalya, Michael, and Christopher Chembe. "A Security Framework for Mobile Application Systems: Case of Android Applications." Zambia ICT Journal 3, no. 2 (2020): 31–43. http://dx.doi.org/10.33260/zictjournal.v3i2.84.
Full textDarari, Radifan, Edi Winarko, and Auli Damayanti. "Encryption and Decryption Application on Images with Hybrid Algorithm Vigenere and RSA." Contemporary Mathematics and Applications (ConMathA) 2, no. 2 (2020): 109. http://dx.doi.org/10.20473/conmatha.v2i2.23855.
Full textXunyi Ren, Linjuan Chen, and Haishan Wan. "Homomorphic Encryption and Its Security Application." International Journal of Digital Content Technology and its Applications 6, no. 7 (2012): 305–11. http://dx.doi.org/10.4156/jdcta.vol6.issue7.36.
Full textRobertson, Vishal Snedan, and Krishnakant Vilas Redkar. "Application of RSAA for File Encryption." International Journal of Engineering Research and Applications 07, no. 07 (2017): 08–10. http://dx.doi.org/10.9790/9622-0707070810.
Full textOrobosade, Alabi, Thompson Aderonke, Alese Boniface, and Arome J. "Cloud Application Security using Hybrid Encryption." Communications on Applied Electronics 7, no. 33 (2020): 25–31. http://dx.doi.org/10.5120/cae2020652866.
Full textHou, Cheng-I., Chih-Yao Lo, and Jai-Houng Leu. "A digital application of data encryption." Journal of Discrete Mathematical Sciences and Cryptography 11, no. 1 (2008): 99–111. http://dx.doi.org/10.1080/09720529.2008.10698169.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textBanerjee, Debjeet, Sagnik Dutta, Souvik Bhattacharyya, Sujan Sarkar, Sneha Rakshit, and Raktim Chakraborty. "NUMBER THEORY AND THEIR APPLICATION IN COMPUTER SCIENCE AND CRYPTOGRAPHY." Journal of Mathematical Sciences & Computational Mathematics 2, no. 1 (2020): 84–89. http://dx.doi.org/10.15864/jmscm.2106.
Full textPriyanto, Dadang, and Raesul Azhar. "Sistem Aplikasi Untuk Keamanan Data Dengan Algoritma 'Des' (Data Encryption Standard)." Jurnal Matrik 16, no. 1 (2017): 67. http://dx.doi.org/10.30812/matrik.v16i1.12.
Full textMiyaji, Atsuko. "Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption." IPSJ Digital Courier 3 (2007): 610–24. http://dx.doi.org/10.2197/ipsjdc.3.610.
Full textSaragih, Devlin Iskandar, and Paska Marto Hasugian. "Enkripsi Database Sekolah SMK Pembangunan Dengan Algoritma IDEA." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 4, no. 1 (2021): 50–56. http://dx.doi.org/10.32672/jnkti.v4i1.2704.
Full textLi, Hong Fang, Ling Jun Yang, and San Xing Cao. "The Application of Improved DES Algorithm in Moblie Monitoring." Applied Mechanics and Materials 263-266 (December 2012): 2097–101. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2097.
Full textYang, Xinyan, Yunhui Yi, Xinguang Xiao, and Yanhong Meng. "Mobile Application Identification based on Hidden Markov Model." ITM Web of Conferences 17 (2018): 02002. http://dx.doi.org/10.1051/itmconf/20181702002.
Full textPang, Chun Jiang. "The Application of Chaotic Encryption Model in the Network Identity Authentication." Advanced Materials Research 532-533 (June 2012): 850–53. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.850.
Full textAl-Qaraghuli, Mohammed, Saadaldeen Ahmed, and Muhammad Ilyas. "Encrypted Vehicular Communication Using Wireless Controller Area Network." 3D SCEEER Conference sceeer, no. 3d (2019): 17–24. http://dx.doi.org/10.37917/ijeee.sceeer.3rd.3.
Full textLIN, XIN, WEIHUI SHI, and YONGXIANG DU. "INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM." International Journal of Modeling, Simulation, and Scientific Computing 04, no. 04 (2013): 1342005. http://dx.doi.org/10.1142/s1793962313420051.
Full textDeng, Ai Ping, and Ben Xiao. "Application of Chaotic Encryption Algorithm in RFID Secure Mechanism." Advanced Materials Research 532-533 (June 2012): 1695–99. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1695.
Full textAziz, Haris, Syed Mushhad Mustuzhar Gilani, Iqtadar Hussain, Abdul Kashif Janjua, and Shahzada Khurram. "A Noise-Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems." Mathematical Problems in Engineering 2021 (April 11, 2021): 1–15. http://dx.doi.org/10.1155/2021/5554707.
Full textGamido, Heidilyn V. "Implementation of a bit permutation-based advanced encryption standard for securing text and image files." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1596. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1596-1601.
Full textLi, Yuehua, Chengcheng Wang, Jiahao Sun, Zhijin Guan, Jiaqing Chen, and Zelin Wang. "Research and Application of Encryption System Based on Quantum Circuit for Mobile Internet Security." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 4 (2021): 1–17. http://dx.doi.org/10.4018/ijcini.20211001.oa26.
Full textNurdin, Dahlan Abdullah, Widia Fatimah, et al. "Sms Encryption Application Using 3Des (Triple Data Encryption Standard) Algorithm Based on Android." Journal of Physics: Conference Series 1363 (November 2019): 012077. http://dx.doi.org/10.1088/1742-6596/1363/1/012077.
Full textWei, Yanhong. "Application of Chaos Theory in Image Encryption." IOP Conference Series: Materials Science and Engineering 750 (March 24, 2020): 012197. http://dx.doi.org/10.1088/1757-899x/750/1/012197.
Full textSingh, Yumnam Kirani, and Swapan Kumar Parui. "Simplet and its Application in Signal Encryption." Multidimensional Systems and Signal Processing 15, no. 4 (2004): 375–94. http://dx.doi.org/10.1023/b:mult.0000037347.82658.6c.
Full textSyed, Dabeeruddin, Shady S. Refaat, and Othmane Bouhali. "Privacy Preservation of Data-Driven Models in Smart Grids Using Homomorphic Encryption." Information 11, no. 7 (2020): 357. http://dx.doi.org/10.3390/info11070357.
Full textChoudhury, Snata, and V. B. Kirubanand. "Data encryption in public cloud using multi-phase encryption model." International Journal of Engineering & Technology 7, no. 1.8 (2018): 223. http://dx.doi.org/10.14419/ijet.v7i1.9309.
Full textJurnal, Redaksi Tim. "PENERAPAN ALGORITMA RIVERT CODE 4 (RC 4) PADA APLIKASI KRIPTOGRAFI DOKUMEN." PETIR 11, no. 1 (2018): 38–47. http://dx.doi.org/10.33322/petir.v11i1.6.
Full textZhang, Chao Xia. "Hyper-Chaotic Cat Map and its Application in Image Processing." Applied Mechanics and Materials 278-280 (January 2013): 1392–96. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1392.
Full textS. Abdulla, Lujain, Musaria K. Mahmood, Abbas F. Salih, and Sulaiman M. Karim. "Analysis and evaluation of symmetrical key ciphers for internet of things smart home." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 1191. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1191-1198.
Full textFarhan, Alaa Kadhim, Nadia M. G. Al-Saidi, Abeer Tariq Maolood, Fahimeh Nazarimehr, and Iqtadar Hussain. "Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder." Entropy 21, no. 10 (2019): 958. http://dx.doi.org/10.3390/e21100958.
Full textPermana, Angga Aditya, and Desi Nurnaningsih. "APPLICATION OF CRYPTOGRAPHY WITH DATA ENCRYPTION STANDARD (DES) ALGORITHM IN PICTURE." JIKA (Jurnal Informatika) 4, no. 2 (2020): 9. http://dx.doi.org/10.31000/jika.v4i2.2640.
Full textLiu, Muhua, and Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions." Computer Journal 63, no. 8 (2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Full textLi, Yan, and Yifei Lu. "ETCC: Encrypted Two-Label Classification Using CNN." Security and Communication Networks 2021 (March 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6633250.
Full textKamarudin, Nur Khairani, Nur Syafiqa Bismi, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi, and Rashidah Ramle. "Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger." Journal of Computing Research and Innovation 5, no. 2 (2020): 21–27. http://dx.doi.org/10.24191/jcrinn.v5i2.136.
Full textChen, Yu. "The Application of Image Security to Electronic Commerce." Advanced Materials Research 468-471 (February 2012): 2908–11. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.2908.
Full text