Journal articles on the topic 'Cryptographic protection methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptographic protection methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zolotareva, Irina, and Irina Gorodinskaya. "CRYPTOGRAPHIC METHODS OF INFORMATION PROTECTION." Science & World 2022, no. 1 (2022): 1–5. http://dx.doi.org/10.26526/2307-9401-2022-1-1-5.
Full textKhamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.
Full textIbrokhimov, Nodirbek Ikromjonovich, and Fayozbek Fazliddin oglu Olimov. "METHODS AND MEANS OF INFORMATION PROTECTION." Research and implementation 2, no. 5 (2024): 186–93. https://doi.org/10.5281/zenodo.11485883.
Full textMs., Kummasani Vinodhini. "Artifical Intelligence in Cryptography: Protection of Cryptographic System under Patents." Annual International Journal on Analysis of Contemporary Legal Affairs (AIJACLA) 5 (May 25, 2025): 95–111. https://doi.org/10.5281/zenodo.15514117.
Full textVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Full textOkhrimenko, Tetiana, Serhii Dorozhynskyi, and Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS." Computer systems and information technologies, no. 1 (March 30, 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Full textОвчаренко, А. А. "Cryptographic methods to protect personal data in financial transactions." Modern Economy Success, no. 3 (March 27, 2024): 246–49. http://dx.doi.org/10.58224/2500-3747-2024-3-246-249.
Full textBelikova, Ksenia Michailovna. "The role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries." Юридические исследования, no. 9 (September 2021): 22–62. http://dx.doi.org/10.25136/2409-7136.2021.9.36508.
Full textMetelkov, A. "About cryptographic information protection measures in the implementation of information technology in the solution of management problems in the social and economic systems." National Security and Strategic Planning 2020, no. 4 (2021): 68–78. http://dx.doi.org/10.37468/2307-1400-2021-2020-4-68-78.
Full textIssagalyeva, Z. А., A. S. Abdiraman, N. K. Medelbayeva, L. S. Aldasheva, and A. Zh Alibek. "Comparative analysis of cryptographic methods of information protection." BULLETIN of the L.N. Gumilyov Eurasian National University. Technical Science and Technology Series 148, no. 3 (2024): 176–88. http://dx.doi.org/10.32523/2616-7263-2024-148-3-176-188.
Full textSinha, Arsh. "Secure Multimedia Content Distribution using Blockchain and Cryptographic Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42012.
Full textBERESTNEV, MIKHAIL, ALEXEY MINBALEEV, and KIRILL EVSIKOV. "ENSURING INFORMATION SECURITY OF MINING EQUIPMENT IN THE QUANTUM ERA." News of the Tula state university. Sciences of Earth 1, no. 1 (2023): 567–84. http://dx.doi.org/10.46689/2218-5194-2023-1-1-567-584.
Full textN Keerthi Reddy, K Venkateswari, N Veeralahari, M Pavithra, and Dr. G Thippanna. "THE ROLE OF AI IN IMPROVINGENCRYPTION IN DATA PRIVACY: AHYPOTHETICAL APPROACH." international journal of engineering technology and management sciences 9, no. 2 (2025): 68–75. https://doi.org/10.46647/ijetms.2025.v09i02.012.
Full textSinicin, Alexey M. "PROTECTION METHODS AND CRYPTOGRAPHIC PROTOCOLS FOR EMBEDDED ELECTRONIC SYSTEMS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/6, no. 150 (2024): 12–23. http://dx.doi.org/10.36871/ek.up.p.r.2024.09.06.002.
Full textLukichov, Vitalii, Yurii Baryshev, Natalia Kondratenko, and Vadym Malinovskyi. "METHOD OF THE ADAPTIVE MULTILAYER INFORMATION PROTECTION ON THE BASIS OF STEGANOGRAPHY AND CRYPTOGRAPHY." Information technology and computer engineering 58, no. 3 (2023): 4–11. http://dx.doi.org/10.31649/1999-9941-2023-58-3-4-11.
Full textEliseev, V. L. "QUANTUM CRYPTO ENCLAVE FOR IMPLEMENTING UNCOMPROMISED TRUSTED DATA CENTERS." Voprosy kiberbezopasnosti 3, no. 67 (2025): 99–104. https://doi.org/10.21681/2311-3456-2025-3-99-104.
Full textYashika Gaidhani. "Privacy-Preserving Cryptographic Protocols Balancing Data Security and User Privacy in Modern Networks." Panamerican Mathematical Journal 35, no. 2s (2025): 651–66. https://doi.org/10.52783/pmj.v35.i2s.3129.
Full textK.L, Bajaj. "Exploring Number Theory: From Prime Numbers to Cryptographic Algorithms." Modern Dynamics: Mathematical Progressions 1, no. 3 (2024): 10–14. https://doi.org/10.36676/mdmp.v1.i3.36.
Full textChochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou, and Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol." Future Internet 14, no. 8 (2022): 232. http://dx.doi.org/10.3390/fi14080232.
Full textSatapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Full textDmytro, Poltavskyi. "Cryptographic techniques in blockchain for enhanced digital asset security." American Journal of Engineering and Technology 07, no. 05 (2025): 76–87. https://doi.org/10.37547/tajet/volume07issue05-06.
Full textFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Full textKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk, and Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS." Innovative Technologies and Scientific Solutions for Industries, no. 4 (18) (December 10, 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.
Full textKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, and Vitaliy Svitlychny. "CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES." Innovative Technologies and Scientific Solutions for Industries, no. 2 (20) (June 30, 2022): 22–34. http://dx.doi.org/10.30837/itssi.2022.20.022.
Full textGeetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.
Full textK. Aruna Kumari. "Cryptographic Algorithms and Computational Complexity: A Mathematical Approach to Securing IT Networks." Journal of Information Systems Engineering and Management 10, no. 25s (2025): 409–20. https://doi.org/10.52783/jisem.v10i25s.4037.
Full textFEDOTOVA, Gilyan V., Yuliya A. KAPUSTINA, and Evgeniya V. ANYANOVA. "Information resources protection technologies on the Internet." National Interests: Priorities and Security 20, no. 10 (2024): 1858–73. http://dx.doi.org/10.24891/ni.20.10.1858.
Full textDymova, H. "Study of Cryptographic Security of Computer Networks." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 57 (February 13, 2025): 15–19. https://doi.org/10.36910/6775-2524-0560-2024-57-02.
Full textPadma, K. U. V., and E. Neelima. "Adaptive lightweight cryptographic framework for data transmission using multi-domain transformations." Multidisciplinary Science Journal 7, no. 11 (2025): 2025460. https://doi.org/10.31893/multiscience.2025460.
Full textBaranov, Igor. "Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity." Cybernetics and Computer Technologies, no. 1 (March 28, 2025): 64–73. https://doi.org/10.34229/2707-451x.25.1.6.
Full textSaragi, Dedy Ronald, Janter Manuel Gultom, Jose Andreas Tampubolon, and Indra Gunawan. "Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (2020): 114. http://dx.doi.org/10.30865/json.v1i2.1745.
Full textChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Full textKorchenko, O. G., and O. M. Hryshchuk. "SPEECH INFORMATION CRYPTOGRAPHIC PROTECTION METHOD BASED ON DIFFERENTIAL TRANSFORMATIONS." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 27 (I) (December 27, 2024): 4–19. https://doi.org/10.46972/2076-1546.2024.27.01.
Full textNadia Mustaqim Ansari, Talha Tariq, Rizwan Iqbal, Azhar Abbas, Haider Abbas, and Muhammad Mohsan Zohaib. "QUANTUM CRYPTOGRAPHY: SECURING DATA IN THE POST-QUANTUM COMPUTING ERA – A COMPREHENSIVE EXPLORATION OF THE FUTURE OF CYBERSECURITY." Kashf Journal of Multidisciplinary Research 2, no. 02 (2025): 28–43. https://doi.org/10.71146/kjmr259.
Full textHussain, Zakir, and Sonia Chamoli. "Enhancing Cloud Security: A Hybrid Cryptographic Approach Combining AES and RSA for Optimal Data Protection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 07 (2025): 1–9. https://doi.org/10.55041/ijsrem51243.
Full textInķēna, Kristiāna, and Sergejs Kodors. "E-SAFETY PROBLEMS AND PROTECTION METHODS." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 22 (April 25, 2018): 37–42. http://dx.doi.org/10.17770/het2018.22.3639.
Full textJ, Mala. "CLOUD DATA PROTECTION FOR PERSONAL HEALTH RECORDS USING PROXY- ENCRYPTION BASED RABIN CERTIFICATELESS SIGNCRYPTION." ICTACT Journal on Communication Technology 15, no. 4 (2024): 3325–31. https://doi.org/10.21917/ijct.2024.0494.
Full textIbrahimov, Bayram G., Ramiz T. Humbatov, and Rufat F. Ibrahimov. "Cryptographic Methods And Means Protection Transmitted Information in Telecommunication Systems." IFAC-PapersOnLine 51, no. 30 (2018): 821–24. http://dx.doi.org/10.1016/j.ifacol.2018.11.187.
Full textEliel Kundai Zhuwankinyu, Munashe Naphtali Mupa, and Sylvester Tafirenyika. "Graph-based security models for AI-driven data storage: A novel approach to protecting classified documents." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 1108–24. https://doi.org/10.30574/wjarr.2025.26.2.1631.
Full textTN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.
Full textManap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva, and Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW." Вестник КазАТК 129, no. 6 (2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.
Full textKarpenko, Andrii, Tetiana Bondarenko, Viacheslav Ovsiannikov, and Valerii Martyniuk. "ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 54–66. http://dx.doi.org/10.28925/2663-4023.2020.10.5466.
Full textЛАВРИК, ІВАН. "ДОСЛІДЖЕННЯ АЛГОРИТМІВ ПОСТКВАНТОВОГО ЦИФРОВОГО ПІДПИСУ". Herald of Khmelnytskyi National University. Technical sciences 333, № 2 (2024): 361–69. http://dx.doi.org/10.31891/2307-5732-2024-333-2-56.
Full textSmirnova, Tetiana, Nataliia Yakymenko, Oleksandr Ulichev, Oksana Konoplitska-Slobodeniuk Konoplitska-Slobodeniuk, and Serhii Smirnov. "INVESTIGATION OF LINEAR TRANSFORMATIONS OF THE PROPOSED HUSHING FUNCTION OF THE ADVANCED MODULE OF CRYPTOGRAPHIC PROTECTION IN INFORMATION AND CIRCUMSTANCES." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 85–92. http://dx.doi.org/10.28925/2663-4023.2022.15.8592.
Full textBanu, Anees. "Improved Algorithm of Steganography Combined with Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.
Full textSaukhanova, Zhanat, Altynbek Sharipbay, Gulmira Shakhmetova, Alibek Barlybayev, Sayat Raykul, and Altay Khassenov. "Identifying the efficiency of applying of finite automata in encryption and decryption." Eastern-European Journal of Enterprise Technologies 3, no. 9 (135) (2025): 65–78. https://doi.org/10.15587/1729-4061.2025.331044.
Full textSiregar, Yunita Sari, Mufida Khairani, Herlina Harahap, and Yessy Fitri Annisa Lubis. "The Implementation Of Discrete Cosine Transform (DCT) And Blowfish Methods In Digital Video Security." Sinkron 7, no. 1 (2022): 232–42. http://dx.doi.org/10.33395/sinkron.v7i1.11286.
Full textMammadov, Farman Khubali. "NEW APPROACH TO BOOK CIPHER: WEB PAGES AS A CRYPTOGRAPHIC KEY." Advanced Information Systems 7, no. 1 (2023): 59–65. http://dx.doi.org/10.20998/2522-9052.2023.1.10.
Full textZhang, Liwen. "Cryptography and DRM: A study of digital copyright protection in the gaming industry." Applied and Computational Engineering 89, no. 1 (2024): 121–24. http://dx.doi.org/10.54254/2755-2721/89/20241059.
Full textLewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich, and Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records." Healthcare Informatics Research 28, no. 2 (2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.
Full text