Academic literature on the topic 'Encrypted'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encrypted.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encrypted"
Sonawane, Supriya S., and N. M. Shahane. "Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 873–78. https://doi.org/10.5281/zenodo.14742667.
Full textHaggag, Ayman, Mohamed Ghoneim, Jianming Lu, and Takashi Yahagi. "Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images." Journal of Advanced Computational Intelligence and Intelligent Informatics 11, no. 7 (2007): 728–34. http://dx.doi.org/10.20965/jaciii.2007.p0728.
Full textHamano, Genki, Shoko Imaizumi, and Hitoshi Kiya. "Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images." Sensors 23, no. 7 (2023): 3400. http://dx.doi.org/10.3390/s23073400.
Full textHussien, Nadia, Nadia Mahmood Hussien, Saba Abdulbaqi Salman, and Mohammad Aljanabi. "Secure Federated Learning with a Homomorphic Encryption Model." International Journal Papier Advance and Scientific Review 4, no. 3 (2023): 1–7. http://dx.doi.org/10.47667/ijpasr.v4i3.235.
Full textLuu Hong Dung, Nguyen Vinh Thai, Nguyen Kim Thanh, and Pham Van Hiep. "A method for constructing public - key block cipher schemes based on discrete logarithm problem." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 15–26. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.15-26.
Full textNaik, Mr Shiva Kumar R., Kshitij Yadav, Hari Om yadav, Niha C. Gowda, and Mounika. "Data Recovery from Encrypted Image and Recovering Image." International Journal of Engineering and Advanced Technology 8, no. 5s (2019): 76–79. http://dx.doi.org/10.35940/ijeat.e1016.0585s19.
Full textCao, Fang, Jiayi Sun, Xiangyang Luo, Chuan Qin, and Ching-Chun Chang. "Privacy-preserving inpainting for outsourced image." International Journal of Distributed Sensor Networks 17, no. 11 (2021): 155014772110590. http://dx.doi.org/10.1177/15501477211059092.
Full textJena, Riyanka, Priyanka Singh, and Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization." Journal of Imaging 9, no. 9 (2023): 172. http://dx.doi.org/10.3390/jimaging9090172.
Full textHusain, Saba Mohammed. "New Encrypted Steganography Approach." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 2 (2017): 36–46. http://dx.doi.org/10.29196/jub.v26i2.472.
Full textPerillo, Angelo Massimo, Giuseppe Persiano, and Alberto Trombetta. "Secure Selections on Encrypted Multi-writer Streams." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–33. http://dx.doi.org/10.1145/3485470.
Full textDissertations / Theses on the topic "Encrypted"
Rosén, Oskar. "Encrypted Chat Client : Encrypted communication over XMPP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499.
Full textBrekne, Tønnes. "Encrypted Computation." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27.
Full textMoataz, Tarik. "Searching over encrypted data." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0418/document.
Full textBrinkman, Richard. "Searching in encrypted data." Enschede : University of Twente [Host], 2007. http://doc.utwente.nl/57878.
Full textReid, Eric. "ENCRYPTED CORRELATING SOURCE SELECTOR." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604265.
Full textTran, Augustin. "Encrypted Collaborative Editing Software." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1703311/.
Full textIzadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Full textRamkumar, Bhuvaneswari. "Encrypted mal-ware detection." [Ames, Iowa : Iowa State University], 2008.
Find full textGuadiana, Juan M., and Fil Macias. "ENCRYPTED BIT ERROR RATE TESTING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607507.
Full textDeng, Mo Ph D. Massachusetts Institute of Technology. "On compression of encrypted data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106100.
Full textBooks on the topic "Encrypted"
Orman, Hilarie. Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6.
Full textWatson, Samuel Wagan. Smoke encrypted whispers. University of Queensland Press, 2004.
Find full textBlinn, Eric. SQL Server Always Encrypted. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5565-0.
Full textCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9.
Full textWen, Mi, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, and Xuemin Shen. Querying over Encrypted Data in Smart Grids. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06355-3.
Full textManz, Olaf. Encrypt, Sign, Attack. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-66015-7.
Full textMoseley, V. J. "Jon", Andreas Lampropoulos, Eftychia Apostolidi, and Christos Giarlelis. Characteristic Seismic Failures of Buildings. Edited by Stephanos E. Dritsos. International Association for Bridge and Structural Engineering (IABSE), 2019. http://dx.doi.org/10.2749/sed016.
Full textBook chapters on the topic "Encrypted"
Orman, Hilarie. "Introduction: What Is Secure Email?" In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_1.
Full textOrman, Hilarie. "A Brief History of Secure Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_2.
Full textOrman, Hilarie. "How Does Secure Email Work?" In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_3.
Full textOrman, Hilarie. "Using Secure Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_4.
Full textOrman, Hilarie. "Living with Encrypted Email." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_5.
Full textOrman, Hilarie. "Conclusion." In Encrypted Email. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6_6.
Full textColilli, Paul. "Encrypted Signs." In The Angel's Corpse. Palgrave Macmillan US, 1999. http://dx.doi.org/10.1057/9780312299668_9.
Full textWeik, Martin H. "encrypted text." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6161.
Full textWeik, Martin H. "encrypted voice." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6162.
Full textCheng, Rong, Bo Zhang, and Fangguo Zhang. "Secure Obfuscation of Encrypted Verifiable Encrypted Signatures." In Provable Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24316-5_14.
Full textConference papers on the topic "Encrypted"
Adamek, Janis, Philipp Binfet, Nils Schlüter, and Moritz Schulze Darup. "Encrypted system identification as-a-service via reliable encrypted matrix inversion." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886076.
Full textChen, Wei, Danhao Wang, Yang Kang, et al. "Achieving Bipolar Photoresponse in III-Nitride Nanowires for Encrypted Optical Communication." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.atu4j.1.
Full textAneja, Sandhya, and Nagender Aneja. "Fingerprinting Browsers in Encrypted Communications." In 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2024. http://dx.doi.org/10.1109/uemcon62879.2024.10754712.
Full textMarañón, José Armando Tesén, and Romaric Duvignau. "Classifying 5G Encrypted Packet Traces." In 2024 International Conference on Electrical, Communication and Computer Engineering (ICECCE). IEEE, 2024. https://doi.org/10.1109/icecce63537.2024.10823417.
Full textGui, Zichen, Oliver Johnson, and Bogdan Warinschi. "Encrypted Databases." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3363210.
Full textOhtaki, Y. "Constructing a searchable encrypted log using encrypted inverted indexes." In 2005 International Conference on Cyberworlds (CW'05). IEEE, 2005. http://dx.doi.org/10.1109/cw.2005.33.
Full textKashyap, Sachin, and Kannan Karthik. "Authenticating encrypted data." In 2011 National Conference on Communications (NCC). IEEE, 2011. http://dx.doi.org/10.1109/ncc.2011.5734696.
Full textZhuravlev, Dmytro, Ihor Samoilovych, Roman Orlovskyi, Ievgen Bondarenko, and Yaroslav Lavrenyuk. "Encrypted Program Execution." In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.108.
Full textArasu, A., K. Eguro, R. Kaushik, and R. Ramamurthy. "Querying encrypted data." In 2013 29th IEEE International Conference on Data Engineering (ICDE 2013). IEEE, 2013. http://dx.doi.org/10.1109/icde.2013.6544919.
Full textBarni, Mauro. "Processing encrypted signals." In Proceeding of the 8th workshop. ACM Press, 2006. http://dx.doi.org/10.1145/1161366.1161367.
Full textReports on the topic "Encrypted"
Thomson, M. Encrypted Content-Encoding for HTTP. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8188.
Full textCook, Paul, David Legare, David Hummel, John Malowicki, David H. Hughes, and Reinhard Erdmann. Investigating Quantum Data Encrypted Modulation States. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada615446.
Full textGoldwasser, Shafi, and Vinod Vaikuntanathan. Computing on Encrypted Data: Theory and Application. Defense Technical Information Center, 2016. http://dx.doi.org/10.21236/ad1002618.
Full textPouliot, David. Balancing Security, Performance and Deployability in Encrypted Search. Portland State University Library, 2020. http://dx.doi.org/10.15760/etd.7297.
Full textSilverberg, Alice. Making Computing on Encrypted Data Secure and Practical. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada586876.
Full textJennings, C., J. Mattsson, D. McGrew, D. Wing, and F. Andreasen. Encrypted Key Transport for DTLS and Secure RTP. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8870.
Full textGalvin, J., S. Murphy, S. Crocker, and N. Freed. Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1847.
Full textTurner, S., and R. Housley. Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6032.
Full textKeranen, A. Encrypted Signaling Transport Modes for the Host Identity Protocol. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6261.
Full textTurner, S. Algorithms for Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6033.
Full text