To see the other types of publications on this topic, follow the link: Data encryption.

Journal articles on the topic 'Data encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Riyaz Fathima Abdul and Saravanan Arumugam. "A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity." Advances in Technology Innovation 10, no. 1 (2025): 15–28. https://doi.org/10.46604/aiti.2024.14114.

Full text
Abstract:
The objective of the study is to introduce a novel hybrid encryption scheme, combining both symmetric and asymmetric encryptions with a data shuffling mechanism, to enhance data obfuscation and encryption security. The approach uses RSA for asymmetric encryption and ChaCha20-Poly1305 for symmetric encryption. To increase the complexity, an additional phase involves reorganizing the RSA-encrypted data blocks. Furthermore, symmetric key generation using the key derivation function is employed to generate the key for symmetric encryption through an asymmetric private key. Decryption entails rever
APA, Harvard, Vancouver, ISO, and other styles
2

Kulwinder, Kaur*1 &. Brahmaleen Kaur Sidhu2. "AN HYBRID APPROACH FOR EFFICIENT DATA ENCRYPTION AND DECRYPTION FOR DATA SECURITY IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 9 (2018): 188–93. https://doi.org/10.5281/zenodo.1421045.

Full text
Abstract:
In this paper, a hybrid encryption is proposed using combination of two asymmetric schemes. The existing schemes are lacking in encrypting large data files, there time complexity may worsen with size. In this work the homomorphic algorithm is used along with RSA, to enhance the encryption and decryption time. The evaluation study has been done between AES, 3DES, DES and proposed algorithm on basis of their time complexities. Our proposed work has very least complexity for both encryption and decryption. Proposed scheme is also highly secure as it involves 2 encryption and decryption rounds.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Full text
Abstract:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emergi
APA, Harvard, Vancouver, ISO, and other styles
4

SHIBU BAI, Mr SHANE. "Recovering and Analysing Data from Encrypted Devices." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45625.

Full text
Abstract:
Abstract - This paper presents a secure and efficient data protection approach using hybrid encryption, combining symmetric and asymmetric cryptographic methods to enhance both speed and security. Symmetric encryption, specifically the AES algorithm, isutilized for encrypting large volumes of data quickly, while RSA is employed to securely exchange the encryption keys. Alongside this, the work also introduces a data recovery and analysis component designed to retrieve and verify encrypted data, ensuring its integrity and accessibility when needed. The system is developed in Java and tested for
APA, Harvard, Vancouver, ISO, and other styles
5

Researcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.

Full text
Abstract:
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate that Oracle 19c TDE offers a seamless and effective solution for data encryption, balancing security and performance. TDE offers functionality that streamlines encryption methods. Transparent Data Encryption (TDE) plays a role in addressing these security concerns by encrypting database files at the storage level ensuring data protection while avoiding th
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.

Full text
Abstract:
In the current era with the rapid development of the Internet, although a variety of technologies have offered convenience to people's lives, numerous problems have arisen regarding the security of individual and collective data, Problems such as data privacy leakage occur continuously. The content of this review is data privacy protection based on homomorphic encryption. Firstly, the basic principle and formula of homomorphic encryption are briefly introduced. Then, the homomorphic encryption-based data privacy protection approach is developed in response to the importance of safeguarding dat
APA, Harvard, Vancouver, ISO, and other styles
7

Benzegane, S., S. Sadoudi, and M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security." Algerian Journal of Signals and Systems 1, no. 1 (2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.

Full text
Abstract:
In this paper, we present a software development of multimedia streaming encryption using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate keystream for encrypting and decrypting real-time multimedia data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme through image and audi
APA, Harvard, Vancouver, ISO, and other styles
8

Sobol, Michael I. "Data Encryption." Information Systems Security 3, no. 3 (1994): 27–31. http://dx.doi.org/10.1080/10658989409342465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hackworth, R. "Data encryption." Computer Bulletin 37, no. 6 (1995): 12–13. http://dx.doi.org/10.1093/combul/37.6.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

DeHart, Ed. "Data encryption." XRDS: Crossroads, The ACM Magazine for Students 15, no. 1 (2008): 21–27. http://dx.doi.org/10.1145/1452012.1452017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ali Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.

Full text
Abstract:
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user duri
APA, Harvard, Vancouver, ISO, and other styles
12

S.K., Mouleeswaran, Kanya Devi J, and Illayaraja. "Class Based Multi Stage Encryption for Efficient Data Security in Cloud Environment Using Profile Data." International Journal of Computer Communication and Informatics 1, no. 1 (2019): 22–29. http://dx.doi.org/10.34256/ijcci1915.

Full text
Abstract:
The security issues in the cloud have been well studied. The data security has much importance in point of data owner. There are number of approaches presented earlier towards performance in data security in cloud. To overcome the issues, a class based multi stage encryption algorithm is presented in this paper. The method classifies the data into number of classes and different encryption scheme is used for different classes in different levels. Similarly, the user has been authenticated for their access and they have been classified into different categories. According to the user profile, t
APA, Harvard, Vancouver, ISO, and other styles
13

DM, Kuryazov. "Optimal Asymmetric Data Encryption Algorithm." International Journal of Science and Research (IJSR) 10, no. 1 (2021): 744–48. https://doi.org/10.21275/sr21107160459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gayathri.A, Revathi.S Thanga, Christy.S, and Pramila.P.V. "An Improved Discrete Patch Based Reversible Data Hiding For Encoded Color Images." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 49–53. https://doi.org/10.35940/ijeat.A9767.029320.

Full text
Abstract:
This paper proposes a system for encrypting images which is performed by patch wise separable reversible data. In the beginning, with the help of encryption key, a content writer prepares the unique uncompressed image. Then, the data-hider abridge encrypted images with least significant using data smacking key therefore to construct a sparse path that can incorporate with some additional data. The encrypted image data consisting of additional data, will aid the receiver to use only one encryption key to recall both additional data and image after decryption. The proposed system enables the rec
APA, Harvard, Vancouver, ISO, and other styles
15

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Full text
Abstract:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches.
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, Er Song, Lin You, Zhen Dong Wu, and Wang Ke Yu. "Massive Data Hybrid Encryption Algorithm Based on Cloud Computing." Applied Mechanics and Materials 651-653 (September 2014): 1864–67. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1864.

Full text
Abstract:
In order to ensure the security of massive data and user’s privacy in cloud computing, encrypting is a preferred method to protect their security. Due to some characteristics of massive data,such as large scale and structural complexity, it makes that the traditional encryption algorithms cannot be directly used to protect the security of massive data in cloud computing. Considering the real-time and reliability of encryption algorithms, we propose a hybrid algorithm, which combines DES algorithm and one-dimensional logistic map by using the parallel computing architecture of the MapReduce. Ou
APA, Harvard, Vancouver, ISO, and other styles
17

Tulasiram, Yadavalli. "Overcoming Challenges in PGP Encryption Implementation: Preserving Data Integrity and Addressing Organizational Hurdles." Journal of Scientific and Engineering Research 7, no. 5 (2020): 414–20. https://doi.org/10.5281/zenodo.15044831.

Full text
Abstract:
Although not the only option out there, Pretty Good Privacy (PGP) has transformed data encryption by significantly enhancing the security of digital communications and file transfers. Unlike traditional encryption, PGP employs a hybrid cryptosystem that employs both symmetric and asymmetric cryptography. This makes it very optimized in terms of performance and speed—encrypting data with a faster symmetric algorithm while using a public key to protect the encryption key. PGP further compresses plaintext data before encryption, reducing disk space usage and transmission time, while improvi
APA, Harvard, Vancouver, ISO, and other styles
18

Dr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.

Full text
Abstract:
<strong>ABSTRACT:</strong> Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms t
APA, Harvard, Vancouver, ISO, and other styles
19

Li, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.

Full text
Abstract:
This paper analyzed the typical architecture of geographic information sharing system based on GML spatial data, pointed out the security risks existed in the network transmission process of the GML spatial data and drawbacks of the existing security transport mechanisms in such a shared system. Further, the paper elaborates on advantages of encrypting the GML data using XML Encryption technology and the encryption process of the GML spatial data. On this basis, the paper gives an application example which encrypts all or part of spatial data in GML documents by the XML Encryption technology.
APA, Harvard, Vancouver, ISO, and other styles
20

Boyd, C. "Modern data encryption." Electronics & Communications Engineering Journal 5, no. 5 (1993): 271. http://dx.doi.org/10.1049/ecej:19930052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ruggieri, M. "Data encryption seminar." IEEE Aerospace and Electronic Systems Magazine 16, no. 2 (2001): 2. http://dx.doi.org/10.1109/maes.2001.904237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Chen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.

Full text
Abstract:
With the application of computer and network technology in the field of accounting, the development of accounting informationization is an inevitable trend, and the construction of accounting statement data into the data warehouse will be the basis of intelligent decision-making. The complexity of industry accounting statements and the arbitrariness and diversity of users’ needs for obtaining information using statements limit the development, popularization, and application of industry accounting statements. As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64
APA, Harvard, Vancouver, ISO, and other styles
23

Limbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.

Full text
Abstract:
Data security is a critical concern in today's digital age, particularly regarding the protection of sensitive information such as cardholder data. This research paper explores the implementation of Advanced Encryption Standard (AES) encryption with a 128-bit key as a means of safeguarding card details. The project demonstrates the encryption and decryption process, ensuring data confidentiality and integrity. Utilizing the pycryptodome library in Python, the AES encryption technique is applied to encrypt card details, offering a secure approach to data protection. The methodology section outl
APA, Harvard, Vancouver, ISO, and other styles
24

Nori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.

Full text
Abstract:
This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementation and have not commonly been applied on image encryption due to huge amount of data. The main contribution here was to reduce the time and the amount of data to be encrypted while maintaining encryption performance. This objective was achieved by encrypting just the most significant bits of image pixels. A 256-bit plain text blocks of the Threef
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.

Full text
Abstract:
This paper creates a new direction for the operation optimization of Simplified Message Block Cipher for 128-bit Data encryption (SM4) national cipher algorithm, which combines with AES algorithm to provide a simpler encryption method for SM4 algorithm. The AES algorithm is for the whole file system-based f encryption scheme, and the implementation concept is to encrypt the file and maintain data security by encrypting files to encrypt and maintain data security. The advantages of this encryption method are that they have few key numbers and are easy to manage. The disadvantage is that when a
APA, Harvard, Vancouver, ISO, and other styles
26

Mandal, Sanjeev Kumar, Amit Sharma, Santosh Kumar Henge, Sumaira Bashir, Madhuresh Shukla, and Asim Tara Pathak. "Secure data encryption key scenario for protecting private data security and privacy." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 269–81. http://dx.doi.org/10.47974/jdmsc-1881.

Full text
Abstract:
Cryptography, specifically encryption, plays a pivotal role in protecting data from unauthorized access. However, not all encryption methods are equally effective, as some exhibit vulnerabilities. This research proposing a novel encryption method that builds upon established techniques to enhance data security. The proposed method combines the strengths of the Festial encryption method and the Advanced Encryption Standard (AES) to create an algorithm that exhibits superior resistance against attacks. The proposed encryption method successfully mitigates vulnerabilities, demonstrating enhanced
APA, Harvard, Vancouver, ISO, and other styles
27

Nemetz, Tibor, and Pál Papp. "Increasing data security by data compression." Studia Scientiarum Mathematicarum Hungarica 42, no. 4 (2005): 343–53. http://dx.doi.org/10.1556/sscmath.42.2005.4.1.

Full text
Abstract:
We analyze the effect of data-compression on security of encryption both from theoretical and practical point of view. It is demonstrated that data-compression essentially improves the security of encryption, helps to overcome technical difficulties. On the other side, it makes crypt-analysis more difficult and causes extra problems. At present data-compression applied rarely and frequently defectively. We propose a method which eliminates the negative effects. Our aim is initiate data compression as an aid for data security. To this end we provide an overview of the most frequently used crypt
APA, Harvard, Vancouver, ISO, and other styles
28

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
APA, Harvard, Vancouver, ISO, and other styles
29

Artajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.

Full text
Abstract:
The security of communication via e-mail is increasingly important in today's digital era, where cyber attacks are increasing. These threats require the development of effective solutions to protect the confidentiality and integrity of information in e-mail. This study presents the development of an e-mail messaging application that employs a hybrid cryptosystem combining Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms. The aim is to improve the security of e-mail communications by utilizing the strengths of both symmetric and asymmetric encryption methods. AES is
APA, Harvard, Vancouver, ISO, and other styles
30

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Full text
Abstract:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate
APA, Harvard, Vancouver, ISO, and other styles
31

Jo, Suhyung, Sang Su Lee, and Doo Ho Choi. "Data Preprocessor for Order Preserving Encryption." Applied Mechanics and Materials 752-753 (April 2015): 1356–59. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1356.

Full text
Abstract:
Sensitive data such as personal telephone number, address, social security number at database is prevented to access by SQL search query. In order to prevent security problems it needs to encrypt database. Order preserving encryption (OPE) is a method of encrypting data so that it's possible to make efficient inequality comparisons on the encrypted items without decrypting them. OPE data of database is available to make index without decryption. In this paper, the data preprocessor by reducing plaintext range, the performance of OPE is increased and sensitive data are protected at database.
APA, Harvard, Vancouver, ISO, and other styles
32

Sun, Jingyi, Jie Yan, and Dingyi Yang. "Mathematical Modeling Analysis of Data Attribute Encryption for Robot." Journal of Sensors 2022 (July 23, 2022): 1–8. http://dx.doi.org/10.1155/2022/3976806.

Full text
Abstract:
Encrypting data based on the data attributes of robots is one of the effective methods to control access users in the data outsourcing environment. Therefore, a mathematical modeling method of robot data attribute encryption based on data redundancy elimination technology is proposed. The encryption algorithm structure is analyzed based on the Bloom filter. The Hamming distance is used to calculate the similarity of big data by the Bloom filter. Finally, a big data ellipse encryption algorithm is designed according to the calculation results. The results show that during the whole experiment,
APA, Harvard, Vancouver, ISO, and other styles
33

Complexity. "Retracted: Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2023 (August 16, 2023): 1. http://dx.doi.org/10.1155/2023/9856582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Thakkar, Viraj, Dongha Kim, Yingchun Lai, Hokeun Kim, and Zhichao Cao. "SHIELD: Encrypting Persistent Data of LSM-KVS from Monolithic to Disaggregated Storage." Proceedings of the ACM on Management of Data 3, no. 3 (2025): 1–28. https://doi.org/10.1145/3725354.

Full text
Abstract:
Log-Structured Merge-tree-based Key-Value Stores (LSM-KVS) are widely used to support modern, high-performance, data-intensive applications. In recent years, with the trend of deploying and optimizing LSM-KVS from monolith to Disaggregated Storage (DS) setups, the confidentiality of LSM-KVS persistent data (e.g., WAL and SST files) is vulnerable to unauthorized access from insiders and external attackers and must be protected using encryption. Existing solutions lack a high-performance design for encryption in LSM-KVS, often focus on in-memory data protection with overheads of 3.4-32.5x, and l
APA, Harvard, Vancouver, ISO, and other styles
35

Shakhmetova, Gulmira, Alibek Barlybayev, Zhanat Saukhanova, Altynbek Sharipbay, Sayat Raykul, and Altay Khassenov. "Enhancing Visual Data Security: A Novel FSM-Based Image Encryption and Decryption Methodology." Applied Sciences 14, no. 11 (2024): 4341. http://dx.doi.org/10.3390/app14114341.

Full text
Abstract:
The paper presents a comprehensive exploration of a novel image encryption and decryption methodology, leveraging finite state machines (FSM) for the secure transformation of visual data. The study meticulously evaluates the effectiveness of the proposed encryption algorithm using a diverse image dataset. The encryption algorithm demonstrates high proficiency in obfuscating the original content of images, producing cipher images that resemble noise, thereby substantiating the encryption’s effectiveness. The robustness of the proposed methodology is further evidenced by its performance in the N
APA, Harvard, Vancouver, ISO, and other styles
36

E., ASHRAF, EMAD F., and MOHAMED E. "VOICE MAIL ENCRYPTION USING INTERNATIONAL DATA ENCRYPTION ALGORITHM." International Conference on Electrical Engineering 2, no. 2 (1999): 65–71. http://dx.doi.org/10.21608/iceeng.1999.62280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Son, Junggab, Yu-Jin Yang, Heekuck Oh, and Sangjin Kim. "Analysis of Data Encryption Mechanisms for Searchable Encryption." Journal of the Korea Society of Computer and Information 18, no. 9 (2013): 79–89. http://dx.doi.org/10.9708/jksci.2013.18.9.079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

LIN, XIN, WEIHUI SHI, and YONGXIANG DU. "INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM." International Journal of Modeling, Simulation, and Scientific Computing 04, no. 04 (2013): 1342005. http://dx.doi.org/10.1142/s1793962313420051.

Full text
Abstract:
The distributed simulation system interoperation can be divided into six levels. Interactive data encryption can be completed in each level, lead to six encryption strategies: data field encryption, data package encryption, program module encryption, simulation application encryption, simulation node encryption, and simulation system encryption. There are four basic Encryption/decryption realization modes: serial modes with software or hardware realization, parallel modes based on embedded processor or FPGA/ASIC system. Large and Complex distributed simulation system may employ one or several
APA, Harvard, Vancouver, ISO, and other styles
39

Milian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.

Full text
Abstract:
This research focuses on the importance of data security in maintaining confidentiality, particularly for sensitive and critical information that should only be accessed by certain parties. Cryptography is a mathematical method used to secure data. Several methods are available, including ROT13, Vernam Cipher, and Stream Cipher. This study combines these three methods to achieve a higher level of data security. The analysis shows that the combination of these algorithms results in a stronger and more complex encryption process than using a single method. The process involves encrypting plainte
APA, Harvard, Vancouver, ISO, and other styles
40

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Full text
Abstract:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption tec
APA, Harvard, Vancouver, ISO, and other styles
41

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Full text
Abstract:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning a
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Yutang, and Qin Zhang. "Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology." Journal of Function Spaces 2022 (August 2, 2022): 1–10. http://dx.doi.org/10.1155/2022/4292063.

Full text
Abstract:
Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems. In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. The big data redundancy elimination algorithm based on similarity calculation is analyzed. By using static data attribute
APA, Harvard, Vancouver, ISO, and other styles
43

Aitkhozhayeva, Y. Zh, and D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.

Full text
Abstract:
Cryptographic encryption mechanisms in the open source PostgreSQL server DBMS are discussed. Special high-level and low-level functions of symmetric encryption of the Pgcrypto module for ensuring information security of data are analyzed. The analysis of special functions of the third-party GPG program is performed, which allow performing asymmetric encryption in the PostgreSQL database server. A combined data encryption technology in database tables is proposed, using a hierarchy of keys (asymmetric and symmetric encryption) with a passphrase, which is also encrypted to ensure better protecti
APA, Harvard, Vancouver, ISO, and other styles
44

Gao, Lixia. "Enterprise internal audit data encryption based on blockchain technology." PLOS ONE 20, no. 1 (2025): e0315759. https://doi.org/10.1371/journal.pone.0315759.

Full text
Abstract:
Internal auditing demands innovative and secure solutions in today’s business environment, with increasing competitive pressure and frequent occurrences of risky and illegal behaviours. Blockchain along with secure databases like encryption improves internal audit security through immutability and transparency. Hence integrating blockchain with homomorphic encryption and multi-factor authentication improves privacy and mitigates computational overhead. Recently, blockchain applications for internal audits in the enterprise sector are still emerging. Thus, blockchain technology in auditing prov
APA, Harvard, Vancouver, ISO, and other styles
45

Volosova, N. K., K. A. Volosov, A. K. Volosova, M. I. Karlov, D. F. Pastuhov, and Yu F. Pastuhov. "Sweep Formulas Applying to Encrypt Text Data." Вестник Пермского университета. Математика. Механика. Информатика, no. 3 (62) (2023): 5–12. http://dx.doi.org/10.17072/1993-0550-2023-3-5-12.

Full text
Abstract:
In this paper we consider for the first time the possibility of applying the tridiagonal runthrough formulas for text data encryption. The encryption algorithm consists in computing the right part of a linear algebraic equations system with a tridiagonal matrix. In the problem, all the equations coefficients, the right-hand side and the solution take the values of the residues modulo a prime number p. The decryption algorithm consists in solving the SLAE on the class of prime modulo p deductions. The decryption algorithm uses the tridiagonal run method. Two theorems are proved for the algorith
APA, Harvard, Vancouver, ISO, and other styles
46

Ladda, Priyanka, Shyama Yadav, and Shashank Vyas. "Decryption and Encryption of Data." Journal of Nonlinear Analysis and Optimization 14, no. 01 (2023): 86–93. http://dx.doi.org/10.36893/jnao.2023.v14i1.087-093.

Full text
Abstract:
In the digital age, the security of data has become a paramount concern. This research paper explores the fundamental concepts and practical applications of encryption and decryption as essential tools for ensuring data security. It delves into the historical evolution of encryption methods and the mathematical foundations of cryptographic algorithms. The paper provides a comprehensive overview of popular encryption algorithms, key management techniques, and the role of encryption in protecting data at rest, in transit, and during processing. Decryption techniques and potential vulnerabilities
APA, Harvard, Vancouver, ISO, and other styles
47

Alshammari, Ahmed. "A Chaotic-Based Image Encryption System Integrated with Blockchain for Secure Data Transmission." International Journal on Information Technologies and Security 17, no. 2 (2025): 89–100. https://doi.org/10.59035/efpn9384.

Full text
Abstract:
In this research, we present an exploration of encryption cryptosystem that integrates chaotic systems and blockchain technology to protect the privacy of your information and ensuring that its trustworthy. The system applies Chua's system, a communally known chaotic model, besides a Bernoulli binary generator to make a robust chaotic sequence for encrypting images. Blockchain technology further strengthens security by maintaining the picture's integrity hash and decryption key inside the blockchain, to make sure the encryption keys are tamper-resistant and sustain an immutable record for secu
APA, Harvard, Vancouver, ISO, and other styles
48

Ahmadov, Samur. "Data encryption as a method of protecting personal data in a cloud environment." Вісник Черкаського державного технологічного університету 29, no. 3 (2024): 31–41. https://doi.org/10.62660/bcstu/3.2024.31.

Full text
Abstract:
In the context of cloud technologies, encryption plays a critical role, as data are constantly transmitted over the network and stored on remote servers, which makes them a potential target for cyber-attacks. The purpose of the study lied in a comprehensive analysis of data encryption methods as the main tool for protecting personal information in cloud services. Modern encryption technologies, including symmetric and asymmetric encryption, and their application in various cloud platforms were considered. A comparative analysis of these methods was conducted in terms of their effectiveness, im
APA, Harvard, Vancouver, ISO, and other styles
49

Arjun, Mantri. "Ensuring Data Security and Privacy During Data Migration." European Journal of Advances in Engineering and Technology 6, no. 3 (2019): 111–15. https://doi.org/10.5281/zenodo.13354011.

Full text
Abstract:
Data migration is a critical process for transferring data between different storage systems, formats, or computing environments, often driven by technological upgrades, cloud adoption, and organizational restructuring. Ensuring data security and privacy during this process is paramount to prevent data breaches and comply with regulatory requirements. This paper discusses comprehensive strategies, including encryption, access control, adherence to data protection regulations, and effective data governance, to mitigate risks associated with data migration. By implementing these techniques, orga
APA, Harvard, Vancouver, ISO, and other styles
50

Ali, Moch Dzikri Azhari, Asep Id Hadiana, and Melina Melina. "Securing Network Log Data Using Advance Encryption Standard Algorithm And Twofish With Common Event Format." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 341–53. https://doi.org/10.46336/ijqrm.v5i3.757.

Full text
Abstract:
The rapid advancement of information technology demands enhanced security for data exchange in the digital world. Network security threats can arise from various sources, necessitating techniques to protect information transmitted between interconnected networks. Securing network logs is a critical step in strengthening overall network security. Network logs are records of activities within a computer network, including unauthorized access attempts, user activities, and other key events. This research focuses on developing a network log security system by comparing the performance of the Advan
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!