Academic literature on the topic 'Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encryption"
Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption." Theoretical and Natural Science 2, no. 1 (February 20, 2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.
Full textPourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (March 13, 2021): 341. http://dx.doi.org/10.3390/e23030341.
Full textArtajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (January 13, 2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.
Full textThabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (December 30, 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Full textEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textAlawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (March 25, 2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Full textHuang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (November 2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.
Full textZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Full textZhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.
Full textLiu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (April 28, 2025): 119–24. https://doi.org/10.54097/cm6eq023.
Full textDissertations / Theses on the topic "Encryption"
Yilmaz, Fatih Levent. "Video Encryption." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12604.
Full textAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Full textMeissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Full textSt-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Full textFauzi, Prastudy. "On Fully Homomorphic Encryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.
Full textTopsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.
Full textWang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Full textKing, Kevin C. "Optimizing fully homomorphic encryption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.
Full textBanu, Pokhali Sayeda Roohi. "Satellite on-board encryption." Thesis, University of Surrey, 2007. http://epubs.surrey.ac.uk/774244/.
Full textAnicama, Jorge. "Prime numbers and encryption." Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/95565.
Full textBooks on the topic "Encryption"
Ahmad, Khairol Amali Bin, Khaleel Ahmad, and Uma N. Dulhare, eds. Functional Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Full textWheeler, David. Block encryption. Cambridge: University of Cambridge Computer Laboratory, 1987.
Find full textRen, Kui, and Cong Wang. Searchable Encryption. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Full textKoç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Full textBiryukov, Alex, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Full textCanteaut, Anne, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Full textLeander, Gregor, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Full textPreneel, Bart, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Full textGollmann, Dieter, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Full textChatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Full textBook chapters on the topic "Encryption"
Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies, 71–75. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Full textBuchanan, W. J. "Encryption." In The Complete Handbook of the Internet, 731–57. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_35.
Full textCarter, Peter A. "Encryption." In Pro SQL Server 2019 Administration, 371–408. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5089-1_11.
Full textMustafa, Osama, and Robert P. Lockard. "Encryption." In Oracle Database Application Security, 1–45. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0_1.
Full textNatarajan, Jay, Rudi Bruchez, Scott Shaw, and Michael Coles. "Encryption." In Pro T-SQL 2012 Programmer’s Guide, 179–203. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4597-1_7.
Full textSpendolini, Scott. "Encryption." In Expert Oracle Application Express Security, 247–63. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4732-6_14.
Full textCebollero, Miguel, Jay Natarajan, and Michael Coles. "Encryption." In Pro T-SQL Programmer's Guide, 207–32. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0145-9_8.
Full textCarter, Peter A. "Encryption." In Pro SQL Server Administration, 317–39. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0710-9_10.
Full textAitchison, Alastair, and Adam Machanic. "Encryption." In Expert SQL Server 2008 Development, 121–58. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7212-0_6.
Full textBuchmann, Johannes A. "Encryption." In Introduction to Cryptography, 69–101. New York, NY: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4684-0496-8_3.
Full textConference papers on the topic "Encryption"
Zhao, Pengyang. "Server-Aided Keyword Search Encryption With Password-Hardened Encryption." In 2024 5th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC), 246–52. IEEE, 2024. https://doi.org/10.1109/isceic63613.2024.10810145.
Full textJ R, Goutham, and Chethan Venkatesh. "Secure Folder Encryption Using Homomorphic Encryption with Microsoft SEAL." In 2025 International Conference on Computing for Sustainability and Intelligent Future (COMP-SIF), 1–6. IEEE, 2025. https://doi.org/10.1109/comp-sif65618.2025.10969942.
Full textYadav, Poonam, and Hukum Singh. "Optical Image Encryption and Classification Using Deep Neural Networks for IoT Applications." In Clinical and Translational Biophotonics. Washington, D.C.: Optica Publishing Group, 2024. http://dx.doi.org/10.1364/translational.2024.jd6a.14.
Full textGao, Haiying, and Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption." In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.
Full textBhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology, 400–408. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.
Full textM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Full textPiper, F. "Encryption." In European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud. IEE, 1997. http://dx.doi.org/10.1049/cp:19970422.
Full textHashizume, Keiko, and Eduardo B. Fernandez. "Symmetric encryption and XML encryption patterns." In the 16th Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1943226.1943243.
Full textCai, Xiantao, Weidong Li, and Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.
Full textWang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm." In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.
Full textReports on the topic "Encryption"
Karri, Ramesh, Ozgur Sinanoglu, and Jeyavihayan Rajendran. Logic Encryption. Fort Belvoir, VA: Defense Technical Information Center, February 2014. http://dx.doi.org/10.21236/ada595228.
Full textRaeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, February 2005. http://dx.doi.org/10.17487/rfc3962.
Full textHarkins, D., and W. Kumari, eds. Opportunistic Wireless Encryption. RFC Editor, March 2017. http://dx.doi.org/10.17487/rfc8110.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), May 2024. http://dx.doi.org/10.21079/11681/48596.
Full textTs'o, T. Telnet Data Encryption Option. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2946.
Full textPark, J., S. Lee, J. Kim, and J. Lee. The SEED Encryption Algorithm. RFC Editor, February 2005. http://dx.doi.org/10.17487/rfc4009.
Full textLee, H. J., S. J. Lee, J. H. Yoon, D. H. Cheon, and J. I. Lee. The SEED Encryption Algorithm. RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4269.
Full textJohnson, Karen L. Semaphore Network Encryption Report. Fort Belvoir, VA: Defense Technical Information Center, March 1994. http://dx.doi.org/10.21236/ada279294.
Full textCoward, John R. Computational Complexity and Encryption. Fort Belvoir, VA: Defense Technical Information Center, February 1995. http://dx.doi.org/10.21236/ada291910.
Full textJones, M., and J. Hildebrand. JSON Web Encryption (JWE). RFC Editor, May 2015. http://dx.doi.org/10.17487/rfc7516.
Full text