Journal articles on the topic 'Data encryption (Computer science) Polynomials'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data encryption (Computer science) Polynomials.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Keerthi, V., and T. Anuradha. "A Generator Based Polynomial with Secret Encryption Scheme for Secure Data Sharing and Privacy in Multi-Party/Federated-Cloud Computation." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (December 10, 2020): 78–82. http://dx.doi.org/10.35940/ijitee.b8270.1210220.
Full textKumar, G. Sravan. "Efficient Data Access Control for Cloud Computing With Large Universe and Traceable Attribute-Based Encryption." International Journal of Fuzzy System Applications 9, no. 4 (October 2020): 61–81. http://dx.doi.org/10.4018/ijfsa.2020100103.
Full textLuo, Fucai, and Saif Al-Kuwari. "Revocable attribute-based proxy re-encryption." Journal of Mathematical Cryptology 15, no. 1 (January 1, 2021): 465–82. http://dx.doi.org/10.1515/jmc-2020-0039.
Full textWu, J. Y., R. Xin, J. B. Zhao, T. Zheng, D. Jiang, and P. F. Zhang. "Study on Delay Optimization of Fog Computing Edge Nodes Based on the CPSO-LB Algorithm." Wireless Communications and Mobile Computing 2020 (December 1, 2020): 1–12. http://dx.doi.org/10.1155/2020/8811175.
Full textFatima, Shahin, and Shish Ahmad. "Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing." International Journal of e-Collaboration 16, no. 1 (January 2020): 1–15. http://dx.doi.org/10.4018/ijec.2020010101.
Full textKeerthi, V., and T. Anuradha. "A Secret data sharing Model for Agriculture Experts in Federated Cloud based on Polynomial based Encrypted Scheme." International Journal of Innovative Technology and Exploring Engineering 10, no. 4 (February 28, 2021): 160–67. http://dx.doi.org/10.35940/ijitee.d8542.0210421.
Full textBabenko, Ludmila, and Alina Trepacheva. "Towards Unsecurity of Two Homomorphic Encryptions Based on Residue System." SPIIRAS Proceedings 18, no. 1 (February 18, 2019): 230–62. http://dx.doi.org/10.15622/sp.18.1.230-262.
Full textZhang, Zheng, and Fangguo Zhang. "Functional encryption for cubic polynomials and implementation." Theoretical Computer Science 885 (September 2021): 41–54. http://dx.doi.org/10.1016/j.tcs.2021.06.020.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textMiller, Dale. "Encryption as an abstract data-type." Electronic Notes in Theoretical Computer Science 84 (September 2003): 18–29. http://dx.doi.org/10.1016/s1571-0661(04)80841-7.
Full textMoulds, Richard. "Protecting cardholder data with encryption." Computer Fraud & Security 2008, no. 6 (June 2008): 14–15. http://dx.doi.org/10.1016/s1361-3723(08)70099-x.
Full textLIN, XIN, WEIHUI SHI, and YONGXIANG DU. "INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM." International Journal of Modeling, Simulation, and Scientific Computing 04, no. 04 (September 12, 2013): 1342005. http://dx.doi.org/10.1142/s1793962313420051.
Full textDamiani, E., S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. "Selective Data Encryption in Outsourced Dynamic Environments." Electronic Notes in Theoretical Computer Science 168 (February 2007): 127–42. http://dx.doi.org/10.1016/j.entcs.2006.11.003.
Full textGong, Changqing, Mengfei Li, Liang Zhao, Zhenzhou Guo, and Guangjie Han. "Homomorphic Evaluation of the Integer Arithmetic Operations for Mobile Edge Computing." Wireless Communications and Mobile Computing 2018 (November 15, 2018): 1–13. http://dx.doi.org/10.1155/2018/8142102.
Full textYu, K. W. "Data Encryption based upon Time Reversal Transformations." Computer Journal 32, no. 3 (March 1, 1989): 241–45. http://dx.doi.org/10.1093/comjnl/32.3.241.
Full textAlameen, Abdalla. "Repeated Attribute Optimization for Big Data Encryption." Computer Systems Science and Engineering 40, no. 1 (2022): 53–64. http://dx.doi.org/10.32604/csse.2022.017597.
Full textSchwartz, Charles. "A NEW GRAPHICAL METHOD FOR ENCRYPTION OF COMPUTER DATA." Cryptologia 15, no. 1 (January 1991): 43–46. http://dx.doi.org/10.1080/0161-119191865777.
Full textFischer, T., M. Neebe, T. Juchem, and N. A. Hampp. "Biomolecular optical data storage and data encryption." IEEE Transactions on Nanobioscience 2, no. 1 (March 2003): 1–5. http://dx.doi.org/10.1109/tnb.2003.810163.
Full textPajany M. and Zayaraz G. "A Robust Lightweight Data Security Model for Cloud Data Access and Storage." International Journal of Information Technology and Web Engineering 16, no. 3 (July 2021): 39–53. http://dx.doi.org/10.4018/ijitwe.2021070103.
Full textMazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Full textSassani (Sarrafpour), Bahman A., Mohammed Alkorbi, Noreen Jamil, M. Asif Naeem, and Farhaan Mirza. "Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices." Scientific Programming 2020 (May 31, 2020): 1–9. http://dx.doi.org/10.1155/2020/6132312.
Full textRabah, Kefa. "Theory and Implementation of Data Encryption Standard: A Review." Information Technology Journal 4, no. 4 (September 15, 2005): 307–25. http://dx.doi.org/10.3923/itj.2005.307.325.
Full textAhmad, Hamza Sajjad, Muhammad Junaid Arshad, and Muhammad Sohail Akram. "Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes." International Journal of Embedded and Real-Time Communication Systems 12, no. 3 (July 2021): 1–13. http://dx.doi.org/10.4018/ijertcs.2021070101.
Full textZhang, Yu, Yin Li, and Yifan Wang. "Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System." Mobile Information Systems 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3839254.
Full textPrabhu, J., and A. Stephen Dass. "Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods." International Journal of Grid and Utility Computing 11, no. 4 (2020): 496. http://dx.doi.org/10.1504/ijguc.2020.10029845.
Full textDass, A. Stephen, and J. Prabhu. "Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods." International Journal of Grid and Utility Computing 11, no. 4 (2020): 496. http://dx.doi.org/10.1504/ijguc.2020.108449.
Full textWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Full textMujtaba, Ghulam, Muhammad Tahir, and Muhammad Hanif Soomro. "Energy Efficient Data Encryption Techniques in Smartphones." Wireless Personal Communications 106, no. 4 (August 11, 2018): 2023–35. http://dx.doi.org/10.1007/s11277-018-5920-1.
Full textShimal, Abeer F., Baydaa H. Helal, and Ashwaq T. Hashim. "Extended of TEA: A 256 bits block cipher algorithm for image encryption." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 3996. http://dx.doi.org/10.11591/ijece.v11i5.pp3996-4007.
Full textDing, Wenxiu, Zheng Yan, and Robert H. Deng. "Encrypted data processing with Homomorphic Re-Encryption." Information Sciences 409-410 (October 2017): 35–55. http://dx.doi.org/10.1016/j.ins.2017.05.004.
Full textXu, Wenju, Baocang Wang, Rongxing Lu, Quanbo Qu, Yange Chen, and Yupu Hu. "Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials." Security and Communication Networks 2021 (April 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/5553256.
Full textChen, Yang, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, and Qiaoyan Wen. "Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures." Computer Journal 62, no. 12 (June 28, 2019): 1748–60. http://dx.doi.org/10.1093/comjnl/bxz052.
Full textWang, Xu, Xiaoyuan Yang, Cong Li, Yudong Liu, and Yong Ding. "Improved functional proxy re-encryption schemes for secure cloud data sharing." Computer Science and Information Systems 15, no. 3 (2018): 585–614. http://dx.doi.org/10.2298/csis171218024w.
Full textSchmitz, Roland, and Jan Gruber. "Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification." Advances in Multimedia 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/5879257.
Full text., Zheng-Quan Xu, and Dereje Yohannes . "Theoretical Analysis of Linear Cryptanalysis Against DES (Data Encryption Standard)." Information Technology Journal 3, no. 1 (December 15, 2003): 49–56. http://dx.doi.org/10.3923/itj.2004.49.56.
Full textGeorge, Sudhish, R. Arun Raj, and P. P. Deepthi. "A New Framework for Encryption and Authentication of Multimedia Data." International Journal of Multimedia and Ubiquitous Engineering 8, no. 5 (September 30, 2013): 105–18. http://dx.doi.org/10.14257/ijmue.2013.8.5.11.
Full textFerdush, Jannatul, Mahbuba Begum, and Mohammad Shorif Uddin. "Chaotic Lightweight Cryptosystem for Image Encryption." Advances in Multimedia 2021 (May 22, 2021): 1–16. http://dx.doi.org/10.1155/2021/5527295.
Full textEl-Kassar, A. N., and Ramzi Haraty. "ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields." Computer Science and Information Systems 2, no. 1 (2005): 63–77. http://dx.doi.org/10.2298/csis0501063e.
Full textPeterson, Dale G. "A new era in data network security: Protocol-sensitive encryption." International Journal of Network Management 5, no. 4 (July 1995): 214–18. http://dx.doi.org/10.1002/nem.4560050410.
Full textEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (July 2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Full textCao, Xinyue, Zhangjie Fu, and Xingming Sun. "A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing." Journal of Electrical and Computer Engineering 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/3219042.
Full textIm, Jong-Hyuk, Hee-Yong Kwon, Seong-Yun Jeon, and Mun-Kyu Lee. "Privacy-Preserving Electricity Billing System Using Functional Encryption." Energies 12, no. 7 (April 1, 2019): 1237. http://dx.doi.org/10.3390/en12071237.
Full textAlassaf, Norah, and Adnan Gutub. "Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications." International Journal of E-Health and Medical Communications 10, no. 4 (October 2019): 1–15. http://dx.doi.org/10.4018/ijehmc.2019100101.
Full textXu, Dawen. "Commutative Encryption and Data Hiding in HEVC Video Compression." IEEE Access 7 (2019): 66028–41. http://dx.doi.org/10.1109/access.2019.2916484.
Full textTsai, Kun-Lin, Fang-Yie Leu, Ilsun You, Shuo-Wen Chang, Shiung-Jie Hu, and Hoonyong Park. "Low-Power AES Data Encryption Architecture for a LoRaWAN." IEEE Access 7 (2019): 146348–57. http://dx.doi.org/10.1109/access.2019.2941972.
Full textArshad, Muhammad Junaid, Muhammad Umair, Saima Munawar, Nasir Naveed, and Humaira Naeem. "Improving Cloud Data Encryption Using Customized Genetic Algorithm." International Journal of Intelligent Systems and Applications 12, no. 6 (December 8, 2020): 46–63. http://dx.doi.org/10.5815/ijisa.2020.06.04.
Full textWang, Licheng, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, and Yixian Yang. "Securing Named Data Networking: Attribute-Based Encryption and Beyond." IEEE Communications Magazine 56, no. 11 (November 2018): 76–81. http://dx.doi.org/10.1109/mcom.2018.1701123.
Full textTian, Qiuting, Dezhi Han, and Yanmei Jiang. "Hierarchical authority based weighted attribute encryption scheme." Computer Science and Information Systems 16, no. 3 (2019): 797–813. http://dx.doi.org/10.2298/csis180912027t.
Full textHuang, Yi-Li, Fang-Yie Leu, Jian-Hong Chen, and Chu Cheng-Chung. "A true Random-Number Encryption Method employing block cipher and PRNG." Computer Science and Information Systems 11, no. 3 (2014): 905–24. http://dx.doi.org/10.2298/csis130921056h.
Full textAlsalam Ali, Nashwan, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Survey on 3D Content Encryption." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 15 (August 11, 2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.
Full text