Academic literature on the topic 'Cryptographic protection methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptographic protection methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptographic protection methods"
Zolotareva, Irina, and Irina Gorodinskaya. "CRYPTOGRAPHIC METHODS OF INFORMATION PROTECTION." Science & World 2022, no. 1 (2022): 1–5. http://dx.doi.org/10.26526/2307-9401-2022-1-1-5.
Full textKhamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.
Full textIbrokhimov, Nodirbek Ikromjonovich, and Fayozbek Fazliddin oglu Olimov. "METHODS AND MEANS OF INFORMATION PROTECTION." Research and implementation 2, no. 5 (2024): 186–93. https://doi.org/10.5281/zenodo.11485883.
Full textMs., Kummasani Vinodhini. "Artifical Intelligence in Cryptography: Protection of Cryptographic System under Patents." Annual International Journal on Analysis of Contemporary Legal Affairs (AIJACLA) 5 (May 25, 2025): 95–111. https://doi.org/10.5281/zenodo.15514117.
Full textVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Full textOkhrimenko, Tetiana, Serhii Dorozhynskyi, and Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS." Computer systems and information technologies, no. 1 (March 30, 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Full textОвчаренко, А. А. "Cryptographic methods to protect personal data in financial transactions." Modern Economy Success, no. 3 (March 27, 2024): 246–49. http://dx.doi.org/10.58224/2500-3747-2024-3-246-249.
Full textBelikova, Ksenia Michailovna. "The role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries." Юридические исследования, no. 9 (September 2021): 22–62. http://dx.doi.org/10.25136/2409-7136.2021.9.36508.
Full textMetelkov, A. "About cryptographic information protection measures in the implementation of information technology in the solution of management problems in the social and economic systems." National Security and Strategic Planning 2020, no. 4 (2021): 68–78. http://dx.doi.org/10.37468/2307-1400-2021-2020-4-68-78.
Full textIssagalyeva, Z. А., A. S. Abdiraman, N. K. Medelbayeva, L. S. Aldasheva, and A. Zh Alibek. "Comparative analysis of cryptographic methods of information protection." BULLETIN of the L.N. Gumilyov Eurasian National University. Technical Science and Technology Series 148, no. 3 (2024): 176–88. http://dx.doi.org/10.32523/2616-7263-2024-148-3-176-188.
Full textDissertations / Theses on the topic "Cryptographic protection methods"
Prykhodko, S. B. "Application of Nonlinear Stochastic Differential Systems for Data Protection in Audio and Graphics Files." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/41209.
Full textГончаренко, В. С. "Реалізація криптографічного методу захисту інформації та збереження шифру в зображенні". Thesis, Сумський державний університет, 2014. http://essuir.sumdu.edu.ua/handle/123456789/38737.
Full textHirschi, Lucca. "Vérification automatique de la protection de la vie privée : entre théorie et pratique." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLN019/document.
Full textКолдовський, Артем Володимирович, Артем Владимирович Колдовский, Artem Volodymyrovych Koldovskyi та К. В. Чернега. "Проблемні аспекти теоретичного осмислення криптовалюти, як явища сучасної інформаційної економіки". Thesis, Українська академія банківської справи Національного банку України, 2015. http://essuir.sumdu.edu.ua/handle/123456789/53441.
Full textRogers, Jason Lee. "Secure distribution of open source information." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FRogers.pdf.
Full textЮшко, Катерина Сергіївна, та Kateryna Serhiivna Yushko. "Особливості навчання учнів старших класів криптографічних методів захисту даних в умовах гурткової роботи". Master's thesis, 2020. http://repository.sspu.edu.ua/handle/123456789/9898.
Full textBooks on the topic "Cryptographic protection methods"
Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Springer, 1997.
Find full textMaksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Full textDegano, Pierpaolo. Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textPetrov, A. a. Computer security. Cryptographic methods of protection. Book on Demand Ltd., 2018.
Find full textGaivoronski, Alexei A., Pavel S. Knopov, Vladimir I. Norkin, and Volodymyr A. Zaslavskyi. Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection 2: Methods and Tools. ISTE-Wiley, 2025. https://doi.org/10.1115/1.862smo.
Full textVisual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2014.
Find full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer London, Limited, 2015.
Find full textLiu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications. Springer, 2016.
Find full textBook chapters on the topic "Cryptographic protection methods"
Ding, Sophia, Emilia Nunes, Pascal Bettendorff, and Weyde Lin. "Biometrics." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.
Full textWeissbaum, François, and Thomas Lugrin. "Symmetric Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_2.
Full textDharmadhikari, Chinmaya M., and Rejo Mathew. "Review of Digital Data Protection Using the Traditional Methods, Steganography and Cryptography." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_54.
Full textBlagoev, Ivan. "Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems." In Advances in High Performance Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55347-0_33.
Full textSchaumueller-Bichl, Ingrid, and Ernst Piller. "A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques." In Advances in Cryptology. Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-39757-4_32.
Full textPenkin, Yu M., G. I. Khara, and A. A. Fedoseeva. "The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments." In Data-Centric Business and Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43070-2_26.
Full textDutkiewicz, Lidia, Yuliya Miadzvetskaya, Hosea Ofe, et al. "Privacy-Preserving Techniques for Trustworthy Data Sharing: Opportunities and Challenges for Future Research." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_15.
Full textKovalchuk, Lyudmila, and Mikhail Savchuk. "Main Directions and Basic Mathematical Ideas of Cryptographic Information Security." In Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection 2: Methods and Tools. ISTE-Wiley, 2025. https://doi.org/10.1115/1.862smo_ch9.
Full textThenmozhi, R., D. Vetriselvi, and A. Arokiaraj Jovith. "Neuro-Inspired Algorithms to Enhance Cryptography." In Machine Learning and Cryptographic Solutions for Data Protection and Network Security. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-4159-9.ch006.
Full textAarthi, S., K. Aravinthan, R. N. Ravikumar, N. Sivakumar, and Soram Wanglen. "Cryptography Securing Data in Motion Within Blockchain, Internet of Everything, and Federated Learning." In Convergence of Blockchain, Internet of Everything, and Federated Learning for Security. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-1424-2.ch002.
Full textConference papers on the topic "Cryptographic protection methods"
Bashminova, Daria, Mansur Gergokov, and Vsevolod Ovchinnikov. "Cryptography methods in protecting financial transactions." In 2024 IEEE 65th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS). IEEE, 2024. http://dx.doi.org/10.1109/itms64072.2024.10741926.
Full textJovanović, Boriša, Ivan Tot, and Silvana Ilić. "Contemporary cryptography: Recent achievement and research perspectives." In 11th International Scientific Conference on Defensive Technologies - OTEX 2024. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24067j.
Full textAleksandrov, Boncho, and Eftim Kilifarev. "Using methods for compressing information like instrument of cryptographic protection." In the conference. ACM Press, 2000. http://dx.doi.org/10.1145/365143.365379.
Full textFilipova-Petrakieva, Simona, and Svetlin Shopov. "Educational Application for Information Protection with the use of Cryptographic Methods - part I." In 2021 XXX International Scientific Conference Electronics (ET). IEEE, 2021. http://dx.doi.org/10.1109/et52713.2021.9579924.
Full textMakarenko, Pavlo, Vladyslav PhD Khotunov, and Natalya Falchenko. "Exploring the Application of Cryptographic Protection Methods in Information Networks Using Crypto Wallets." In INFORMATION TECHNOLOGIES AND MANAGEMENT. Baltija Publishing, 2024. http://dx.doi.org/10.30525/978-9934-26-459-7-22.
Full textBykov, S. V. "Laboratory work “non-cryptographic methods and means for information protection in telephone channels”." In 2008 9th International Scientific-Technical Conference on Actual Problems of Electronic Instrument Engineering (APEIE). IEEE, 2008. http://dx.doi.org/10.1109/apeie.2008.4897114.
Full textFilipova-Petrakieva, Simona, and Svetlin Shopov. "Educational Windows Presentation Foundation and XAML Application for Information Protection based on the Cryptographic Methods – part II." In 2021 13th Electrical Engineering Faculty Conference (BulEF). IEEE, 2021. http://dx.doi.org/10.1109/bulef53491.2021.9690842.
Full textPalaniappan, Janaki Raman. "Crypto your Belongings by Two Pin Authentication using Ant Algorithm based Technique." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121210.
Full textPARASKEVOV, HRISTO, and EKREM MEHMEDOV. "STEGANOGRAPHIC PROGRAM WITH A GRAPHICAL INTERFACE FOR DATA PROTECTION IN SOCIAL NETWORKS." In INTERNATIONAL SCIENTIFIC CONFERENCE MATHTECH 2022. Konstantin Preslavsky University Press, 2022. http://dx.doi.org/10.46687/jnvu5241.
Full textGrace, A. A., V. V. Kalitina, D. R. Idrisova, D. M. Skryabin, K. P. Lukyanov, and A. P. Engel. "Blockchain technology as a method of data protection in modern conditions." In IV All-Russian (National) Scientific Conference "Achievements of Science and Technology". Krasoyarsk Science & Technology City Hall, 2025. https://doi.org/10.47813/dnit.4.2025.3019.
Full textReports on the topic "Cryptographic protection methods"
Gudimov, V. N., and S. G. Samochvalova. Software visualization of cryptographic protection methods. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2025. https://doi.org/10.12731/ofernio.2025.25460.
Full textManral, V., M. Bhatia, J. Jaeggli, and R. White. Issues with Existing Cryptographic Protection Methods for Routing Protocols. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6039.
Full text