Academic literature on the topic 'Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encryption"

1

Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption." Theoretical and Natural Science 2, no. 1 (2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.

Full text
Abstract:
Encryption is an important factor during online communication. It is useful to protect users privacy and prevent eavesdroppers listening. RSA encryption and quantum encryption are two mainstream encryption methods applied nowadays. This paper focuses on the evaluation and comparison between these two encryptions. It adopts the basic theory of RSA encryption and quantum encryption and provides an analysis of the benefits and shortcomings of these encryptions. It can be concluded that RSA (a type of mathematical encryption) is more popular than quantum encryption (a kind of physical encryption),
APA, Harvard, Vancouver, ISO, and other styles
2

Pourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (2021): 341. http://dx.doi.org/10.3390/e23030341.

Full text
Abstract:
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been suggested to improve secure image encryption schemes. Nowadays, chaotic methods have been found in diverse fields, such as the design of cryptosystems and image encryption. Chaotic methods-based digital image encryptions are a novel image encryption method. This technique uses random chaos sequences for encrypting images, and it is a highly-secured
APA, Harvard, Vancouver, ISO, and other styles
3

Artajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.

Full text
Abstract:
The security of communication via e-mail is increasingly important in today's digital era, where cyber attacks are increasing. These threats require the development of effective solutions to protect the confidentiality and integrity of information in e-mail. This study presents the development of an e-mail messaging application that employs a hybrid cryptosystem combining Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms. The aim is to improve the security of e-mail communications by utilizing the strengths of both symmetric and asymmetric encryption methods. AES is
APA, Harvard, Vancouver, ISO, and other styles
4

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Full text
Abstract:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate
APA, Harvard, Vancouver, ISO, and other styles
5

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
APA, Harvard, Vancouver, ISO, and other styles
6

Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.

Full text
Abstract:
Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.

Full text
Abstract:
This project explores digital cryptography through the cryptography security system of RSA encryption. It also explores digital signature encryption with a simple hashing mechanism. This project resulted in a program that encoded and decoded messages using RSA encryption, handled large numbers, and calculated encryptions in a viable amount of time.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Full text
Abstract:
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is th
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.

Full text
Abstract:
Image encryption technology has been applied in many fields and is becoming the main way of protecting the image information security. There are also many ways of image encryption. However, the existing encryption algorithms, in order to obtain a better effect of encryption, always need encrypting several times. There is not an effective method to decide the number of encryption times, generally determined by the human eyes. The paper proposes an image encryption algorithm based on chaos and simultaneously proposes a balanced pixel algorithm to determine the times of image encryption. Many sim
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.

Full text
Abstract:
This paper creates a new direction for the operation optimization of Simplified Message Block Cipher for 128-bit Data encryption (SM4) national cipher algorithm, which combines with AES algorithm to provide a simpler encryption method for SM4 algorithm. The AES algorithm is for the whole file system-based f encryption scheme, and the implementation concept is to encrypt the file and maintain data security by encrypting files to encrypt and maintain data security. The advantages of this encryption method are that they have few key numbers and are easy to manage. The disadvantage is that when a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Encryption"

1

Yilmaz, Fatih Levent. "Video Encryption." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12604.

Full text
Abstract:
Video Encryption is nearly the best method for blocking unwanted seizures and viewing of any transmitted video or information. There are several useful techniques that are available for encryping videos. However, one of the unique speciality for human eye is spotting the irregularity in videos due to weak video decoding or weak choice of video encryption hardware. Because of this situation, it is very important to select the right hardware or else our video transmissions may not be secured or our decoded video may be un-watchable. Every technique has advantages and disadvantages over other tec
APA, Harvard, Vancouver, ISO, and other styles
2

Akdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.

Full text
Abstract:
In this study, a new method is proposed to protect JPEG still images through encryption by employing integer-to-integer transforms and frequency domain scrambling in DCT channels. Different from existing methods in the literature, the encrypted image can be further compressed, i.e. transcoded, after the encryption. The method provides selective encryption/security level with the adjustment of its parameters. The encryption method is tested with various images and compared with the methods in the literature in terms of scrambling performance, bandwidth expansion, key size and security. Furtherm
APA, Harvard, Vancouver, ISO, and other styles
3

Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.

Full text
Abstract:
Die heutige Informationsgesellschaft hat die Formen des menschlichen Handelns in vielen Bereichen des taeglichen Lebens veraendert. Die Moeglichkeit, Informationen über das Internet auszutauschen, draengt konventionelle Kommunikationsformen immer mehr in den Hintergrund. Gerade in den Bereichen eBusiness und ePayment, welche aufgrund der zunehmenden Globalisierung unabdingbar sind, spielen dabei die Sicherheit und die Authentitaet der uebertragenen Daten eine wichtige Rolle. Meine Seminararbeit stellt den Data Encryption Standard (DES) in seiner Funktionsweise vor, diskutiert kritisch dessen S
APA, Harvard, Vancouver, ISO, and other styles
4

St-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.

Full text
Abstract:
To the field of cryptography, quantum mechanics is a game changer. The exploitation of quantum mechanical properties through the manipulation of quantum information, the information encoded in the state of quantum systems, would allow many protocols in use today to be broken as well as lead to the expansion of cryptography to new protocols. In this thesis, quantum encryption, i.e. encryption schemes for quantum data, is defined, along with several definitions of security, broadly divisible into semantic security and ciphertext indistinguishability, which are proven equivalent, in analogy to th
APA, Harvard, Vancouver, ISO, and other styles
5

Fauzi, Prastudy. "On Fully Homomorphic Encryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.

Full text
Abstract:
Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and perform arbitrary operations on this data efficiently.The data remains encrypted throughout, but the operations can be done regardless, without having to know the decryption key.Such a scheme would be very advantageous, for example in ensuring the privacy of data that is sent to a third-party service.This is in contrast with schemes like Paillier where you can not perform a multiplication of encrypted data without decrypting the data first, or ElGamal where you can not perform an addition of encry
APA, Harvard, Vancouver, ISO, and other styles
6

Topsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.

Full text
Abstract:
This thesis is about the theory behind and software development of TDE View. The application produces a graphical presentation containing graphical objects, such as charts and tables, which display real time data derived from online and currently available services in Swedbank. TDE View is a long term replacement of the previous solution, TDE System Monitor, the purpose of TDE View is to provide the ability to preview the aforementioned features online instead of local deployment. Moreover, the thesis will cover aspects regarding concepts and ideas in transferring data from different hosts in
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.

Full text
Abstract:
Protecting video streams while incurring minimal impact on the compression performance is very important for practical video distribution. Selective encryption is one of the most promising techniques that can offer the required security while maintaining format compliance after encryption with no or little impact on the compression performance. Also, selective encryption techniques can be employed in video surveillance systems to alleviate concerns over privacy invasion by applying the encryption to specific regions of interest. This thesis presents advanced selective encryption techniques for
APA, Harvard, Vancouver, ISO, and other styles
8

King, Kevin C. "Optimizing fully homomorphic encryption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 50-51).<br>Fully homomorphic encryption (FHE) presents the possibility of removing the need to trust cloud providers with plaintext data. We present two new FHE scheme variants of BGV'12, both of which remove the need for ke
APA, Harvard, Vancouver, ISO, and other styles
9

Banu, Pokhali Sayeda Roohi. "Satellite on-board encryption." Thesis, University of Surrey, 2007. http://epubs.surrey.ac.uk/774244/.

Full text
Abstract:
In the light of latest intrusions into satellite data the demand to protect the sensitive and valuable data transmitted from satellites to ground has increased and hence the need to use encryption on-board. The Advanced Encryption Standard (AES), which is a very popular choice in terrestrial communications, is slowly emerging as the preferred option in the aerospace industry including satellites. Computing systems on-board satellites have limited power and computational resources as in terrestrial embedded systems. With these constraints in mind various implementations of the AES algorithm usi
APA, Harvard, Vancouver, ISO, and other styles
10

Anicama, Jorge. "Prime numbers and encryption." Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/95565.

Full text
Abstract:
In this article we will deal with the prime numbers and its current use in encryption algorithms. Encryption algorithms make possible the exchange of sensible data in internet, such as bank transactions, email correspondence and other internet transactions where privacy is important.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Encryption"

1

Ahmad, Khairol Amali Bin, Khaleel Ahmad, and Uma N. Dulhare, eds. Functional Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wheeler, David. Block encryption. University of Cambridge Computer Laboratory, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ren, Kui, and Cong Wang. Searchable Encryption. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Biryukov, Alex, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Canteaut, Anne, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leander, Gregor, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Preneel, Bart, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gollmann, Dieter, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Encryption"

1

Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.

Full text
Abstract:
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage. New schemes with more efficient search operations and reduced access and search pattern leakage that support novel settings, such as dynamic data sets and multiple users, have been proposed in the last few years. Especially with the emergence of cloud storage, encryptin
APA, Harvard, Vancouver, ISO, and other styles
2

Buchanan, W. J. "Encryption." In The Complete Handbook of the Internet. Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carter, Peter A. "Encryption." In Pro SQL Server 2019 Administration. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5089-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mustafa, Osama, and Robert P. Lockard. "Encryption." In Oracle Database Application Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Natarajan, Jay, Rudi Bruchez, Scott Shaw, and Michael Coles. "Encryption." In Pro T-SQL 2012 Programmer’s Guide. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4597-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Spendolini, Scott. "Encryption." In Expert Oracle Application Express Security. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4732-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cebollero, Miguel, Jay Natarajan, and Michael Coles. "Encryption." In Pro T-SQL Programmer's Guide. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0145-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Carter, Peter A. "Encryption." In Pro SQL Server Administration. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0710-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aitchison, Alastair, and Adam Machanic. "Encryption." In Expert SQL Server 2008 Development. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7212-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Buchmann, Johannes A. "Encryption." In Introduction to Cryptography. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4684-0496-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encryption"

1

Zhao, Pengyang. "Server-Aided Keyword Search Encryption With Password-Hardened Encryption." In 2024 5th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC). IEEE, 2024. https://doi.org/10.1109/isceic63613.2024.10810145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

J R, Goutham, and Chethan Venkatesh. "Secure Folder Encryption Using Homomorphic Encryption with Microsoft SEAL." In 2025 International Conference on Computing for Sustainability and Intelligent Future (COMP-SIF). IEEE, 2025. https://doi.org/10.1109/comp-sif65618.2025.10969942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yadav, Poonam, and Hukum Singh. "Optical Image Encryption and Classification Using Deep Neural Networks for IoT Applications." In Clinical and Translational Biophotonics. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/translational.2024.jd6a.14.

Full text
Abstract:
In this paper, we present a novel method for encrypting images using double random phase encoding (DRPE) and securely storing them in the cloud without decryption. These encrypted images are classified using deep convolutional neural networks (CNN) in the cloud, eliminating the need for data decryption, and enhancing privacy. This approach has promising applications in fields like medicine and transportation, offering high-speed encryption and secure cloud storage while maintaining excellent image classification performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Gao, Haiying, and Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption." In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.

Full text
Abstract:
Non-zero inner product encryption provides fine-grained access control to private data, but the existing non-zero inner product encryption schemes are mainly constructed based on the problem of bilinear groups and lattices without homomorphism. To meet the needs of users to control private data and cloud servers to directly process ciphertexts in a cloud computing environment, this paper designs a non-zero inner product encryption scheme based on the DCR assumption. Specifically, the access control policy is embedded in the ciphertext by a vector y, and the user attribute vector x is embedded
APA, Harvard, Vancouver, ISO, and other styles
5

Bhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.

Full text
Abstract:
Within the field of cybersecurity, protecting visual data poses significant difficulties because of its extensive use and vulnerability to unwanted access. This article introduces the Enhanced Lightweight Visual Cryptosystem (ELVC), which is intended to strengthen cybersecurity by efficiently encrypting visual data. Using the Blake2 hash algorithm and advanced encryption techniques, the ELVC encrypts AC and DC coefficients, which are critical components in visual data compression. The encryption algorithm improves data security by calculating entropy, histograms, and PSNR values. Rigorous NIST
APA, Harvard, Vancouver, ISO, and other styles
6

M. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.

Full text
Abstract:
The importance of data encryption has grown dramatically, especially in terms of personal data. The elliptic curve cryptosystem is the major solution for data security because it has become more prevalent. Security and privacy are required to ensure the data has recently generated much concern within the research community. This paper's objective is to obtain a complicated and secure ciphertext and make cryptanalysis difficult. In this paper, we modified the El-Gamal Elliptic Curve Cryptosystem (ECC) by producing new secret keys for encrypting data and embedding messages by using Discrete Loga
APA, Harvard, Vancouver, ISO, and other styles
7

Piper, F. "Encryption." In European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud. IEE, 1997. http://dx.doi.org/10.1049/cp:19970422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hashizume, Keiko, and Eduardo B. Fernandez. "Symmetric encryption and XML encryption patterns." In the 16th Conference. ACM Press, 2010. http://dx.doi.org/10.1145/1943226.1943243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cai, Xiantao, Weidong Li, and Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.

Full text
Abstract:
Model security for collaborative product design in a networked environment (or called networked manufacture, grid manufacture, and cloud manufacture) is an important but also challenging research issue. In order to support collaborative product design in a secure and flexible means, a partial encryption based secure sharing method for Computer Aided Design (CAD) model is presented in this paper. Based on the above method, parts of a CAD model can be selected flexibly by users for encrypting according to different users’ requirements. The secret keys for the different parts of the CAD model can
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm." In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Encryption"

1

Karri, Ramesh, Ozgur Sinanoglu, and Jeyavihayan Rajendran. Logic Encryption. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada595228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harkins, D., and W. Kumari, eds. Opportunistic Wireless Encryption. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
APA, Harvard, Vancouver, ISO, and other styles
5

Ts'o, T. Telnet Data Encryption Option. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Park, J., S. Lee, J. Kim, and J. Lee. The SEED Encryption Algorithm. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, H. J., S. J. Lee, J. H. Yoon, D. H. Cheon, and J. I. Lee. The SEED Encryption Algorithm. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Johnson, Karen L. Semaphore Network Encryption Report. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada279294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Coward, John R. Computational Complexity and Encryption. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada291910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jones, M., and J. Hildebrand. JSON Web Encryption (JWE). RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!