Academic literature on the topic 'Data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data encryption"
Riyaz Fathima Abdul and Saravanan Arumugam. "A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity." Advances in Technology Innovation 10, no. 1 (2025): 15–28. https://doi.org/10.46604/aiti.2024.14114.
Full textKulwinder, Kaur*1 &. Brahmaleen Kaur Sidhu2. "AN HYBRID APPROACH FOR EFFICIENT DATA ENCRYPTION AND DECRYPTION FOR DATA SECURITY IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 9 (2018): 188–93. https://doi.org/10.5281/zenodo.1421045.
Full textLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Full textSHIBU BAI, Mr SHANE. "Recovering and Analysing Data from Encrypted Devices." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45625.
Full textResearcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.
Full textLi, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.
Full textBenzegane, S., S. Sadoudi, and M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security." Algerian Journal of Signals and Systems 1, no. 1 (2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.
Full textSobol, Michael I. "Data Encryption." Information Systems Security 3, no. 3 (1994): 27–31. http://dx.doi.org/10.1080/10658989409342465.
Full textHackworth, R. "Data encryption." Computer Bulletin 37, no. 6 (1995): 12–13. http://dx.doi.org/10.1093/combul/37.6.12.
Full textDeHart, Ed. "Data encryption." XRDS: Crossroads, The ACM Magazine for Students 15, no. 1 (2008): 21–27. http://dx.doi.org/10.1145/1452012.1452017.
Full textDissertations / Theses on the topic "Data encryption"
Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Full textFahmy, A. "Data encryption of communication data links." Thesis, University of Kent, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385199.
Full textTopsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.
Full textLuque, González Jorge, and Fernandez Ignacio Arenchaga. "Data Encryption on a Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9352.
Full textYu, Lingfeng. "Multidimensional data encryption with virtual optics /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?MECH%202003%20YU.
Full textIslam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Full textJones, John W. "Data encryption based on the logarithm problem." Thesis, University of Ottawa (Canada), 1986. http://hdl.handle.net/10393/4825.
Full textClevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.
Full textMoulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textBooks on the topic "Data encryption"
National Bureau of Standards. Data encryption standard. U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textBlinn, Eric. SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. IBM, International Technical Support Organization, 2010.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textinc, International Resource Development, ed. Data, text & voice encryption worldwide markets. International Resource Development, 1987.
Find full textinc, International Resource Development, ed. Data, fax & voice encryption equipment, worldwide. International Resource Development, 1991.
Find full textAdir, Allon, Ehud Aharoni, Nir Drucker, Ronen Levy, Hayim Shaul, and Omri Soceanu. Homomorphic Encryption for Data Science (HE4DS). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65494-7.
Full textKumar, Keshav, and Bishwajeet Kumar Pandey. Next Generation Mechanisms for Data Encryption. CRC Press, 2024. https://doi.org/10.1201/9781003508632.
Full textBook chapters on the topic "Data encryption"
Lenhard, Thomas H. "Encryption." In Data Security. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_12.
Full textLafe, Olu. "Data Encryption." In Cellular Automata Transforms. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4365-7_5.
Full textBuchanan, William J. "Data Encryption." In Advanced Data Communications and Networks. Springer US, 1997. http://dx.doi.org/10.1007/978-1-4419-8670-2_15.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_98-2.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_98.
Full textBuchanan, Bill. "Data Encryption." In Handbook of Data Communications and Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4757-0905-6_16.
Full textBuchanan, W. "Data Encryption." In Advanced Data Communications and Networks. CRC Press, 2023. http://dx.doi.org/10.1201/9781003420415-15.
Full textWeik, Martin H. "data encryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4264.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_98.
Full textKrähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Full textConference papers on the topic "Data encryption"
Mageshwaran, M. K., and P. Sri Ramya. "Data Protection in the Era of Big Data Advanced Encryption Standard VS Data Encryption Standard." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877503.
Full textKulkarni, Milind, Pranav Doshi, Pavanraje Gaikwad, Nidhi Gandhi, Samika Gandhi, and Vaishnavi Dudhe. "PixelVault: Data Masking and Encryption." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810990.
Full textKaya, Muhammed Saadetdin, and Kenan İInce. "Using Quantum Resistant Variants of NIST IR 8454 Lightweight Encryption Algorithms in Image Encryption." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710906.
Full textYan, Keyu. "Exploration and Discussion for Bitcoin Encryption Algorithms." In International Conference on Data Science and Engineering. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012819100004547.
Full textMakasiranondh, Woratat, Supanit Angsirikul, and Anucha Aribarg. "A Data Spoofing Encryption Algorithm for Data Security and Data Privacy." In 2024 8th International Conference on Information Technology (InCIT). IEEE, 2024. https://doi.org/10.1109/incit63192.2024.10810622.
Full textIgnacio-Cerrato, Sara, David Pacios, José Miguel Ezquerro Rodríguez, et al. "Ultracolor Multiplexing in QR Codes for Data Encryption and Transmission." In Frontiers in Optics. Optica Publishing Group, 2024. https://doi.org/10.1364/fio.2024.jd4a.3.
Full textBhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.
Full textShiraishi, Momoko. "Secure Cloud Data Encryption." In 2023 2nd Asia-Pacific Computer Technologies Conference (APCT). IEEE, 2023. http://dx.doi.org/10.1109/apct58752.2023.00014.
Full textWang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm." In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.
Full textGiblin, Chris, Sean Rooney, Pascal Vetsch, and Adrian Preston. "Securing Kafka with Encryption-at-Rest." In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2021. http://dx.doi.org/10.1109/bigdata52589.2021.9671388.
Full textReports on the topic "Data encryption"
Ts'o, T. Telnet Data Encryption Option. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2946.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textRobertson, Perry J., Lyndon George Pierson, and Edward L. Witzke. Data encryption standard ASIC design and development report. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/918309.
Full textAppenzeller, G., L. Martin, and M. Schertler. Identity-Based Encryption Architecture and Supporting Data Structures. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5408.
Full textLoftis, Charles, Tennyson Chen, and Jonathan Cirella. Attribute-level encryption of data in public android databases. RTI Press, 2013. http://dx.doi.org/10.3768/rtipress.2013.op.0016.1309.
Full textKelly, S. Security Implications of Using the Data Encryption Standard (DES). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4772.
Full textBozhko, A., ed. Properties of Authenticated Encryption with Associated Data (AEAD) Algorithms. RFC Editor, 2025. https://doi.org/10.17487/rfc9771.
Full textBarker, W. C., and E. B. Barker. Recommendation for the triple data encryption algorithm (TDEA) block cipher. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-67r1.
Full textBarker, Elaine, and Nicky Mouha. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-67r2.
Full textBarker, W. C. Recommendation for the triple data encryption algorithm (TDEA) block cipher. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.sp.800-67v1.
Full text