Academic literature on the topic 'Data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data encryption"
Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (March 25, 2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Full textBenzegane, S., S. Sadoudi, and M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security." Algerian Journal of Signals and Systems 1, no. 1 (February 1, 2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.
Full textSobol, Michael I. "Data Encryption." Information Systems Security 3, no. 3 (January 1994): 27–31. http://dx.doi.org/10.1080/10658989409342465.
Full textHackworth, R. "Data encryption." Computer Bulletin 37, no. 6 (December 1, 1995): 12–13. http://dx.doi.org/10.1093/combul/37.6.12.
Full textDeHart, Ed. "Data encryption." XRDS: Crossroads, The ACM Magazine for Students 15, no. 1 (September 2008): 21–27. http://dx.doi.org/10.1145/1452012.1452017.
Full textAli Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Full textS.K., Mouleeswaran, Kanya Devi J, and Illayaraja. "Class Based Multi Stage Encryption for Efficient Data Security in Cloud Environment Using Profile Data." International Journal of Computer Communication and Informatics 1, no. 1 (May 30, 2019): 22–29. http://dx.doi.org/10.34256/ijcci1915.
Full textYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (November 30, 2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Full textYang, Er Song, Lin You, Zhen Dong Wu, and Wang Ke Yu. "Massive Data Hybrid Encryption Algorithm Based on Cloud Computing." Applied Mechanics and Materials 651-653 (September 2014): 1864–67. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1864.
Full textLi, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.
Full textDissertations / Theses on the topic "Data encryption"
Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Full textFahmy, A. "Data encryption of communication data links." Thesis, University of Kent, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385199.
Full textTopsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.
Full textLuque, González Jorge, and Fernandez Ignacio Arenchaga. "Data Encryption on a Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9352.
Full textEn este proyecto encontraras un estudio sobre diferentes algoritmos de encriptación, que son usados para salvaguardar la información en mensajes por la red. Además hemos desarrollado una aplicación cliente-servidor que enviara información a través de la red de forma segura. Hay dos tipos de algoritmos de encriptación, los simétricos y los asimétricos. Ambos tipos de algoritmos son utilizados para establecer la comunicación, el asimétrico (RSA) es utilizado para establecer la clave del simétrico y a partir de entonces se utilizara exclusivamente el algoritmo simétrico (Blowfish).
Yu, Lingfeng. "Multidimensional data encryption with virtual optics /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?MECH%202003%20YU.
Full textIslam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Full textDue to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
Jones, John W. "Data encryption based on the logarithm problem." Thesis, University of Ottawa (Canada), 1986. http://hdl.handle.net/10393/4825.
Full textClevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.
Full textDepartment of Computer Science
Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textBooks on the topic "Data encryption"
National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textBlinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.
Full textHeld, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. Poughkeepsie, NY: IBM, International Technical Support Organization, 2010.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Find full textinc, International Resource Development, ed. Data, text & voice encryption worldwide markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.
Find full textinc, International Resource Development, ed. Data, fax & voice encryption equipment, worldwide. New Canaan, Conn: International Resource Development, 1991.
Find full textLibrary of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.
Find full textSmith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Find full textBook chapters on the topic "Data encryption"
Lenhard, Thomas H. "Encryption." In Data Security, 65–68. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_12.
Full textLafe, Olu. "Data Encryption." In Cellular Automata Transforms, 115–23. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4365-7_5.
Full textBuchanan, William J. "Data Encryption." In Advanced Data Communications and Networks, 219–29. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4419-8670-2_15.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems, 1–4. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_98-2.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems, 574. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_98.
Full textBuchanan, Bill. "Data Encryption." In Handbook of Data Communications and Networks, 180–89. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4757-0905-6_16.
Full textWeik, Martin H. "data encryption." In Computer Science and Communications Dictionary, 346. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4264.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems, 750–54. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_98.
Full textBuchanan, W. "Data Encryption." In Advanced Data Communications and Networks, 219–29. London: CRC Press, 2023. http://dx.doi.org/10.1201/9781003420415-15.
Full textKrähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies, 71–75. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Full textConference papers on the topic "Data encryption"
Shiraishi, Momoko. "Secure Cloud Data Encryption." In 2023 2nd Asia-Pacific Computer Technologies Conference (APCT). IEEE, 2023. http://dx.doi.org/10.1109/apct58752.2023.00014.
Full textWang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm." In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.
Full textGiblin, Chris, Sean Rooney, Pascal Vetsch, and Adrian Preston. "Securing Kafka with Encryption-at-Rest." In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2021. http://dx.doi.org/10.1109/bigdata52589.2021.9671388.
Full textDamasceno, Kayque, Carlos Cruz, Anderson De Oliveira, and Luís De Castro. "Alternative N-bit Key Data Encryption for Block Ciphers." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13990.
Full textZhang, Qixin. "An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption." In 2021 2nd International Conference on Computing and Data Science (CDS). IEEE, 2021. http://dx.doi.org/10.1109/cds52072.2021.00111.
Full textKruse, H., and A. Mukherjee. "Data compression using text encryption." In Proceedings DCC '97. Data Compression Conference. IEEE, 1997. http://dx.doi.org/10.1109/dcc.1997.582107.
Full textXu, Liaoran, Chenyang Zhao, Weili Jiang, Jun Ye, Yan Zhao, and Zhengqi Zhang. "Secure Encryption Scheme for Medical Data based on Homomorphic Encryption." In 2023 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2023. http://dx.doi.org/10.1109/icdsns58469.2023.10245348.
Full textEl-Yahyaoui, Ahmed, and Mohamed Dafir EC-Chrif El Kettani. "Fully homomorphic encryption." In BDCA'17: 2nd international Conference on Big Data, Cloud and Applications. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3090354.3090364.
Full textBorse, Yogita, Deepti Patole, and Purnima Ahirao. "Geo-Encryption: A location based encryption technique for data security." In 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA). IEEE, 2019. http://dx.doi.org/10.1109/iccubea47591.2019.9129586.
Full textBulbul, Busranur, Serif Bahtiyar, and Deniz Turgay Altilar. "Homomorphic Encryption versus Searchable Encryption for Data Retrieval on Cloud." In 2020 5th International Conference on Computer Science and Engineering (UBMK). IEEE, 2020. http://dx.doi.org/10.1109/ubmk50275.2020.9219533.
Full textReports on the topic "Data encryption"
Ts'o, T. Telnet Data Encryption Option. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2946.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), May 2024. http://dx.doi.org/10.21079/11681/48596.
Full textRobertson, Perry J., Lyndon George Pierson, and Edward L. Witzke. Data encryption standard ASIC design and development report. Office of Scientific and Technical Information (OSTI), October 2003. http://dx.doi.org/10.2172/918309.
Full textAppenzeller, G., L. Martin, and M. Schertler. Identity-Based Encryption Architecture and Supporting Data Structures. RFC Editor, January 2009. http://dx.doi.org/10.17487/rfc5408.
Full textLoftis, Charles, Tennyson Chen, and Jonathan Cirella. Attribute-level encryption of data in public android databases. Research Triangle Park, NC: RTI Press, September 2013. http://dx.doi.org/10.3768/rtipress.2013.op.0016.1309.
Full textKelly, S. Security Implications of Using the Data Encryption Standard (DES). RFC Editor, December 2006. http://dx.doi.org/10.17487/rfc4772.
Full textBarker, W. C., and E. B. Barker. Recommendation for the triple data encryption algorithm (TDEA) block cipher. Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-67r1.
Full textBarker, Elaine, and Nicky Mouha. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. Gaithersburg, MD: National Institute of Standards and Technology, November 2017. http://dx.doi.org/10.6028/nist.sp.800-67r2.
Full textBarker, W. C. Recommendation for the triple data encryption algorithm (TDEA) block cipher. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.sp.800-67v1.
Full textBarker, W. C. Recommendation for the triple data encryption algorithm (TDEA) block cipher. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.sp.800-67ver1.
Full text