Academic literature on the topic 'Encrypted files'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encrypted files.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encrypted files"
Wang, Senmiao, Sujuan Qin, Nengqiang He, et al. "KRRecover: An Auto-Recovery Tool for Hijacked Devices and Encrypted Files by Ransomwares on Android." Symmetry 13, no. 5 (2021): 861. http://dx.doi.org/10.3390/sym13050861.
Full textGuo, Chen, Xingbing Fu, Yaojun Mao, Guohua Wu, Fagen Li, and Ting Wu. "Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing." Information 9, no. 10 (2018): 242. http://dx.doi.org/10.3390/info9100242.
Full textAl-Smadi, Ahmad Mohamad, Ahmad Al-Smadi, Roba Mahmoud Ali Aloglah, Nisrein Abu-darwish, and Ahed Abugabah. "Files cryptography based on one-time pad algorithm." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (2021): 2335. http://dx.doi.org/10.11591/ijece.v11i3.pp2335-2342.
Full textGupta, Daya Sagar, and G. P. Biswas. "Secure Computation on Cloud Storage." Journal of Cases on Information Technology 17, no. 3 (2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Full textDeng, Zuojie, Xiaolan Tan, and Shuhong Chen. "An Encrypted File Deduplication Scheme with Permission in Cloud Storage." Mathematical Problems in Engineering 2018 (November 7, 2018): 1–13. http://dx.doi.org/10.1155/2018/6091807.
Full textJawahir, Ahmad, and Haviluddin Haviluddin. "An audio encryption using transposition method." International Journal of Advances in Intelligent Informatics 1, no. 2 (2015): 98. http://dx.doi.org/10.26555/ijain.v1i2.24.
Full textBarbosa, Flávio, Arthur Vidal, and Flávio Mello. "Machine Learning for Cryptographic Algorithm Identification." Journal of Information Security and Cryptography (Enigma) 3, no. 1 (2016): 3. http://dx.doi.org/10.17648/enig.v3i1.55.
Full textSIRA-RAMÍREZ, HEBERTT, CARLOS AGUILAR IBÁÑEZ, and MIGUEL SUÁREZ-CASTAÑÓN. "EXACT STATE RECONSTRUCTORS IN THE RECOVERY OF MESSAGES ENCRYPTED BY THE STATES OF NONLINEAR DISCRETE-TIME CHAOTIC SYSTEMS." International Journal of Bifurcation and Chaos 12, no. 01 (2002): 169–77. http://dx.doi.org/10.1142/s0218127402004243.
Full textParuchuri, Vijaya Lakshmi, Dr R. Sridevi, and K. S. SadaSiva Rao. "Image Steganography combined with Cryptography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 1 (2013): 976–84. http://dx.doi.org/10.24297/ijct.v9i1.4160.
Full textAlcantara, Licinius Dimitri Sá de. "Towards a simple and secure method for binary cryptography via linear algebra." Revista Brasileira de Computação Aplicada 9, no. 3 (2017): 44. http://dx.doi.org/10.5335/rbca.v9i3.6556.
Full textDissertations / Theses on the topic "Encrypted files"
Barkman, Linus. "Detektering av krypterade filer." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15723.
Full textKarumanchi, Sushama. "A TRUSTED STORAGE SYSTEM FOR THE CLOUD." UKnowledge, 2010. http://uknowledge.uky.edu/gradschool_theses/22.
Full textLiu, Kang-Wei, and 劉康威. "Secure Deduplication of Encrypted Files Over Untrusted Cloud Storage." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/8977e2.
Full textWang, Pei-Yu. "Using Key Rotation and TPMs for Encrypted File System Access Control - Based on Antiquity Storage System." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2407200814243600.
Full textWang, Pei-Yu, and 王貝瑜. "Using Key Rotation and TPMs for Encrypted File System Access Control – Based on Antiquity Storage System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37102829094000361181.
Full textCarvalho, David Alexandre Milheiro de. "Towards the detection of encrypted peer-to-peer file sharing traffic and peer-to-peer TV traffic using deep packet inspection methods." Master's thesis, 2009. http://hdl.handle.net/10400.6/3870.
Full textBook chapters on the topic "Encrypted files"
Li, Ya-Nan, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, and Meixia Miao. "Outsourcing Encrypted Excel Files." In Information Security Practice and Experience. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_30.
Full textOprea, Alina, and Michael K. Reiter. "On Consistency of Encrypted Files." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11864219_18.
Full textSelvi, S. Sharmila Deva, Arinjita Paul, Siva Dirisala, Saswata Basu, and C. Pandu Rangan. "Sharing of Encrypted Files in Blockchain Made Simpler." In Mathematical Research for Blockchain Economy. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37110-4_4.
Full textWei, Lei, and Michael K. Reiter. "Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40203-6_9.
Full textWei, Lei, and Michael K. Reiter. "Third-Party Private DFA Evaluation on Encrypted Files in the Cloud." In Computer Security – ESORICS 2012. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33167-1_30.
Full textJames, Maria, Chungath Srinivasan, K. V. Lakshmy, and M. Sethumadhavan. "Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation." In Advances in Intelligent Systems and Computing. Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-10-0251-9_36.
Full textDey, Hemanta, and Uttam Kumar Roy. "Performance Analysis of Encrypted Data Files by Improved RC4 (IRC4) and Original RC4." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3223-3_50.
Full textGe, Liang, and Lianhai Wang. "Decryption and Forensic System for Encrypted iPhone Backup Files Based on Parallel Random Search." In Applications and Techniques in Information Security. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48683-2_31.
Full textVinayak, ASVK, Sudeep Ranjan Swain, and Satyabrata Maity. "File Encryptor." In Smart Innovation, Systems and Technologies. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6202-0_64.
Full textLin, Xiaodong, Chenxi Zhang, and Theodora Dule. "On Achieving Encrypted File Recovery." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23602-0_1.
Full textConference papers on the topic "Encrypted files"
Kumar, V. Venkatesa, and A. Murugavel. "Ensuring consistency file authentication over encrypted files in the cloud." In 2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS). IEEE, 2015. http://dx.doi.org/10.1109/iciiecs.2015.7192941.
Full textFu, Songling, Xiangke Liao, Lianyue He, Chenlin Huang, Xiaodong Tang, and Si Zheng. "Efficient and fine-grained sharing of encrypted files." In 2010 IEEE 18th International Workshop on Quality of Service (IWQoS). IEEE, 2010. http://dx.doi.org/10.1109/iwqos.2010.5542714.
Full textEl Houti, Youssef, and Andrea Miele. "Efficient Update of Encrypted Files for Cloud Storage." In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC). IEEE, 2015. http://dx.doi.org/10.1109/ucc.2015.100.
Full textWolfe, Henry. "Encountering Encrypted Evidence (potential)." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2590.
Full textXing, Yafei, Xiaoming Ju, and Zhongwen Qian. "The Attribute-weight Cache Replacement Algorithm for Encrypted Files." In 2018 IEEE 4th International Conference on Computer and Communications (ICCC). IEEE, 2018. http://dx.doi.org/10.1109/compcomm.2018.8780696.
Full textBerrueta, Eduardo, Daniel Morato, Eduardo Magana, and Mikel Izal. "Ransomware Encrypted Your Files but You Restored Them from Network Traffic." In 2018 2nd Cyber Security in Networking Conference (CSNet). IEEE, 2018. http://dx.doi.org/10.1109/csnet.2018.8602978.
Full textUto, Nelson. "Retrieving Information from Malware Encrypted Output Files: Two Case Studies from Brazil." In 2012 IEEE International Conference on Green Computing and Communications (GreenCom). IEEE, 2012. http://dx.doi.org/10.1109/greencom.2012.122.
Full textGevorgyan, R. A., and E. S. Abramov. "Detection of packaged and encrypted PE files with the use of machine-learning algorithm." In SIN '18: 11th International Conference On Security Of Information and Networks. ACM, 2018. http://dx.doi.org/10.1145/3264437.3264481.
Full textMagalhães, Eduardo, Thiago Santos, and Erivelton Geraldo Nepomuceno. "Audio Encryption Scheme based on Pseudo-orbit of Chaotic Map." In Simpósio Brasileiro de Computação Musical. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbcm.2019.10448.
Full textMrdovic, Sasa, and Alvin Huseinovic. "Forensic analysis of encrypted volumes using hibernation file." In 2011 19th Telecommunications Forum Telfor (TELFOR). IEEE, 2011. http://dx.doi.org/10.1109/telfor.2011.6143785.
Full text