Journal articles on the topic 'Data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Riyaz Fathima Abdul and Saravanan Arumugam. "A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity." Advances in Technology Innovation 10, no. 1 (2025): 15–28. https://doi.org/10.46604/aiti.2024.14114.
Full textKulwinder, Kaur*1 &. Brahmaleen Kaur Sidhu2. "AN HYBRID APPROACH FOR EFFICIENT DATA ENCRYPTION AND DECRYPTION FOR DATA SECURITY IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 9 (2018): 188–93. https://doi.org/10.5281/zenodo.1421045.
Full textLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Full textSHIBU BAI, Mr SHANE. "Recovering and Analysing Data from Encrypted Devices." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45625.
Full textResearcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.
Full textLi, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.
Full textBenzegane, S., S. Sadoudi, and M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security." Algerian Journal of Signals and Systems 1, no. 1 (2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.
Full textSobol, Michael I. "Data Encryption." Information Systems Security 3, no. 3 (1994): 27–31. http://dx.doi.org/10.1080/10658989409342465.
Full textHackworth, R. "Data encryption." Computer Bulletin 37, no. 6 (1995): 12–13. http://dx.doi.org/10.1093/combul/37.6.12.
Full textDeHart, Ed. "Data encryption." XRDS: Crossroads, The ACM Magazine for Students 15, no. 1 (2008): 21–27. http://dx.doi.org/10.1145/1452012.1452017.
Full textAli Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Full textS.K., Mouleeswaran, Kanya Devi J, and Illayaraja. "Class Based Multi Stage Encryption for Efficient Data Security in Cloud Environment Using Profile Data." International Journal of Computer Communication and Informatics 1, no. 1 (2019): 22–29. http://dx.doi.org/10.34256/ijcci1915.
Full textDM, Kuryazov. "Optimal Asymmetric Data Encryption Algorithm." International Journal of Science and Research (IJSR) 10, no. 1 (2021): 744–48. https://doi.org/10.21275/sr21107160459.
Full textGayathri.A, Revathi.S Thanga, Christy.S, and Pramila.P.V. "An Improved Discrete Patch Based Reversible Data Hiding For Encoded Color Images." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 49–53. https://doi.org/10.35940/ijeat.A9767.029320.
Full textYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Full textYang, Er Song, Lin You, Zhen Dong Wu, and Wang Ke Yu. "Massive Data Hybrid Encryption Algorithm Based on Cloud Computing." Applied Mechanics and Materials 651-653 (September 2014): 1864–67. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1864.
Full textTulasiram, Yadavalli. "Overcoming Challenges in PGP Encryption Implementation: Preserving Data Integrity and Addressing Organizational Hurdles." Journal of Scientific and Engineering Research 7, no. 5 (2020): 414–20. https://doi.org/10.5281/zenodo.15044831.
Full textDr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.
Full textLi, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.
Full textBoyd, C. "Modern data encryption." Electronics & Communications Engineering Journal 5, no. 5 (1993): 271. http://dx.doi.org/10.1049/ecej:19930052.
Full textRuggieri, M. "Data encryption seminar." IEEE Aerospace and Electronic Systems Magazine 16, no. 2 (2001): 2. http://dx.doi.org/10.1109/maes.2001.904237.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textLimbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.
Full textNori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Full textLiu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.
Full textMandal, Sanjeev Kumar, Amit Sharma, Santosh Kumar Henge, Sumaira Bashir, Madhuresh Shukla, and Asim Tara Pathak. "Secure data encryption key scenario for protecting private data security and privacy." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 269–81. http://dx.doi.org/10.47974/jdmsc-1881.
Full textNemetz, Tibor, and Pál Papp. "Increasing data security by data compression." Studia Scientiarum Mathematicarum Hungarica 42, no. 4 (2005): 343–53. http://dx.doi.org/10.1556/sscmath.42.2005.4.1.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textArtajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.
Full textThabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Full textJo, Suhyung, Sang Su Lee, and Doo Ho Choi. "Data Preprocessor for Order Preserving Encryption." Applied Mechanics and Materials 752-753 (April 2015): 1356–59. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1356.
Full textSun, Jingyi, Jie Yan, and Dingyi Yang. "Mathematical Modeling Analysis of Data Attribute Encryption for Robot." Journal of Sensors 2022 (July 23, 2022): 1–8. http://dx.doi.org/10.1155/2022/3976806.
Full textComplexity. "Retracted: Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2023 (August 16, 2023): 1. http://dx.doi.org/10.1155/2023/9856582.
Full textThakkar, Viraj, Dongha Kim, Yingchun Lai, Hokeun Kim, and Zhichao Cao. "SHIELD: Encrypting Persistent Data of LSM-KVS from Monolithic to Disaggregated Storage." Proceedings of the ACM on Management of Data 3, no. 3 (2025): 1–28. https://doi.org/10.1145/3725354.
Full textShakhmetova, Gulmira, Alibek Barlybayev, Zhanat Saukhanova, Altynbek Sharipbay, Sayat Raykul, and Altay Khassenov. "Enhancing Visual Data Security: A Novel FSM-Based Image Encryption and Decryption Methodology." Applied Sciences 14, no. 11 (2024): 4341. http://dx.doi.org/10.3390/app14114341.
Full textE., ASHRAF, EMAD F., and MOHAMED E. "VOICE MAIL ENCRYPTION USING INTERNATIONAL DATA ENCRYPTION ALGORITHM." International Conference on Electrical Engineering 2, no. 2 (1999): 65–71. http://dx.doi.org/10.21608/iceeng.1999.62280.
Full textSon, Junggab, Yu-Jin Yang, Heekuck Oh, and Sangjin Kim. "Analysis of Data Encryption Mechanisms for Searchable Encryption." Journal of the Korea Society of Computer and Information 18, no. 9 (2013): 79–89. http://dx.doi.org/10.9708/jksci.2013.18.9.079.
Full textLIN, XIN, WEIHUI SHI, and YONGXIANG DU. "INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM." International Journal of Modeling, Simulation, and Scientific Computing 04, no. 04 (2013): 1342005. http://dx.doi.org/10.1142/s1793962313420051.
Full textMilian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.
Full textParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Full textLiu, Yutang, and Qin Zhang. "Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology." Journal of Function Spaces 2022 (August 2, 2022): 1–10. http://dx.doi.org/10.1155/2022/4292063.
Full textAitkhozhayeva, Y. Zh, and D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.
Full textGao, Lixia. "Enterprise internal audit data encryption based on blockchain technology." PLOS ONE 20, no. 1 (2025): e0315759. https://doi.org/10.1371/journal.pone.0315759.
Full textVolosova, N. K., K. A. Volosov, A. K. Volosova, M. I. Karlov, D. F. Pastuhov, and Yu F. Pastuhov. "Sweep Formulas Applying to Encrypt Text Data." Вестник Пермского университета. Математика. Механика. Информатика, no. 3 (62) (2023): 5–12. http://dx.doi.org/10.17072/1993-0550-2023-3-5-12.
Full textLadda, Priyanka, Shyama Yadav, and Shashank Vyas. "Decryption and Encryption of Data." Journal of Nonlinear Analysis and Optimization 14, no. 01 (2023): 86–93. http://dx.doi.org/10.36893/jnao.2023.v14i1.087-093.
Full textAlshammari, Ahmed. "A Chaotic-Based Image Encryption System Integrated with Blockchain for Secure Data Transmission." International Journal on Information Technologies and Security 17, no. 2 (2025): 89–100. https://doi.org/10.59035/efpn9384.
Full textAhmadov, Samur. "Data encryption as a method of protecting personal data in a cloud environment." Вісник Черкаського державного технологічного університету 29, no. 3 (2024): 31–41. https://doi.org/10.62660/bcstu/3.2024.31.
Full textArjun, Mantri. "Ensuring Data Security and Privacy During Data Migration." European Journal of Advances in Engineering and Technology 6, no. 3 (2019): 111–15. https://doi.org/10.5281/zenodo.13354011.
Full textAli, Moch Dzikri Azhari, Asep Id Hadiana, and Melina Melina. "Securing Network Log Data Using Advance Encryption Standard Algorithm And Twofish With Common Event Format." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 341–53. https://doi.org/10.46336/ijqrm.v5i3.757.
Full text