Journal articles on the topic 'Encryption (Computer science)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Encryption (Computer science).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
AlTuhafi, Ammar Waysi. "Adaptation for Vigenère Cipher Method for Auto Binary Files Ciphering." ITM Web of Conferences 42 (2022): 01017. http://dx.doi.org/10.1051/itmconf/20224201017.
Full textBanerjee, Debjeet, Sagnik Dutta, Souvik Bhattacharyya, Sujan Sarkar, Sneha Rakshit, and Raktim Chakraborty. "NUMBER THEORY AND THEIR APPLICATION IN COMPUTER SCIENCE AND CRYPTOGRAPHY." Journal of Mathematical Sciences & Computational Mathematics 2, no. 1 (2020): 84–89. http://dx.doi.org/10.15864/jmscm.2106.
Full textBozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.
Full textSingh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.
Full textGlen, Jode. "Security Risks in Computer Networks and Application of Data Encryption Techniques." Computer Life 12, no. 1 (2024): 5–7. http://dx.doi.org/10.54097/x4eym481.
Full textYang, Junpu. "Computer Data Encryption System Based on Nonlinear Partial Differential Equations." Mobile Information Systems 2022 (August 19, 2022): 1–9. http://dx.doi.org/10.1155/2022/3395019.
Full textAlsalam Ali, Nashwan, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Survey on 3D Content Encryption." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 15 (2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.
Full textKumar, B.Ravi, Chandra Sekhar A., and G.Appala Naidu. "An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 03 (2015): 1548–54. https://doi.org/10.5281/zenodo.14770594.
Full textKuo, Tzu-Hsiang, and Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol." Mathematics 11, no. 5 (2023): 1227. http://dx.doi.org/10.3390/math11051227.
Full textREN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Full textAyo-Aderele, A. O., S. O. Edeki, V. O. Udjor, and O. Ugbenu. "A note on matrix algebra for cryptography settings and applications." Journal of Physics: Conference Series 2199, no. 1 (2022): 012016. http://dx.doi.org/10.1088/1742-6596/2199/1/012016.
Full textHuang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.
Full textRaghad Abdulaali Azeez, Abeer Salim Jamil, and Mohammed Salih Mahdi. "A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 07 (2023): 69–81. http://dx.doi.org/10.3991/ijim.v17i07.38753.
Full textLiu, Guanxiu. "The Application of Data Encryption Technology in Computer Network Communication Security." Mobile Information Systems 2022 (August 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/3632298.
Full textYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Full textNurhidayati, Rika, and Salauddin Muis. "Analysis Of Voice Data Security Security By Using The Rc4 Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 2 (2021): 22–28. http://dx.doi.org/10.54209/infosains.v11i2.44.
Full textKanshi, Avaneesh, Rajkumar Soundrapandiyan, V. S. Anita Sofia, and V. R. Rajasekar. "Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard." Cybernetics and Information Technologies 23, no. 4 (2023): 63–78. http://dx.doi.org/10.2478/cait-2023-0036.
Full textBoneh, Dan, Amit Sahai, and Brent Waters. "Functional encryption." Communications of the ACM 55, no. 11 (2012): 56–64. http://dx.doi.org/10.1145/2366316.2366333.
Full textKöhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.
Full textAbusham, Eimad, Basil Ibrahim, Kashif Zia, and Sanad Al Maskari. "An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System." Scientific Programming 2022 (November 25, 2022): 1–17. http://dx.doi.org/10.1155/2022/2628885.
Full textJoshi, Bineet, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, and Dragan Peraković. "A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–11. http://dx.doi.org/10.4018/ijcac.309936.
Full textHao-Qiang Xu, Hao-Qiang Xu, and Jian-Dong Liu Hao-Qiang Xu. "Research on Video Encryption Technology Based on Cross Coupled Map Lattices System." 電腦學刊 34, no. 2 (2023): 175–89. http://dx.doi.org/10.53106/199115992023043402013.
Full textLiu, Muhua, and Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions." Computer Journal 63, no. 8 (2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Full textSetti, Sunil, Indra Gunawan, Bahrudi Efendi Damanik, Sumarno Sumarno, and Ika Okta Kirana. "Implementasi Algoritma Advanced Encryption Standard dalam Pengamanan Data Penjualan Ramayana Department Store." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (2020): 182. http://dx.doi.org/10.30865/jurikom.v7i1.1960.
Full textWolfe, Hank. "Encountering encryption." Computers & Security 22, no. 5 (2003): 388–91. http://dx.doi.org/10.1016/s0167-4048(03)00504-2.
Full textSchenkel, I. "Beyond encryption." ITNOW 51, no. 2 (2009): 8–9. http://dx.doi.org/10.1093/itnow/bwp025.
Full textAbe, Masayuki, Yang Cui, Hideki Imai, and Eike Kiltz. "Efficient hybrid encryption from ID-based encryption." Designs, Codes and Cryptography 54, no. 3 (2009): 205–40. http://dx.doi.org/10.1007/s10623-009-9320-0.
Full textLe, Minh Ha, Vinh Duc Tran, Van Anh Trinh, and Viet Cuong Trinh. "Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption." Theoretical Computer Science 804 (January 2020): 219–35. http://dx.doi.org/10.1016/j.tcs.2019.11.034.
Full textKanungo, Avnish, Ayushi Srivastava, Saniya Anklesaria, and Prathamesh Churi. "A systematic review on video encryption algorithms: A future research." Journal of Autonomous Intelligence 6, no. 2 (2023): 665. http://dx.doi.org/10.32629/jai.v6i2.665.
Full textBerisha, Artan, and Hektor Kastrati. "Parallel impelementation of RC6 algorithm." Journal of Computer Science and Technology Studies 3, no. 2 (2021): 01–09. http://dx.doi.org/10.32996/jcsts.2021.3.2.1.
Full textMone, Gregory. "Future-proof encryption." Communications of the ACM 56, no. 11 (2013): 12–14. http://dx.doi.org/10.1145/2524713.2524718.
Full textCommunications of the ACM Staff, CORPORATE. "Debating encryption standards." Communications of the ACM 35, no. 7 (1992): 32–34. http://dx.doi.org/10.1145/129902.129903.
Full textPhuong, Tran Viet Xuan, Guomin Yang, and Willy Susilo. "Criteria-Based Encryption." Computer Journal 61, no. 4 (2017): 512–25. http://dx.doi.org/10.1093/comjnl/bxx088.
Full textFeigenbaum, Joan. "Encryption and surveillance." Communications of the ACM 62, no. 5 (2019): 27–29. http://dx.doi.org/10.1145/3319079.
Full textPapadopoulos, Iason, and Jiabo Wang. "Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber." Cryptography 7, no. 1 (2023): 2. http://dx.doi.org/10.3390/cryptography7010002.
Full textA. Rashid, Abdullah, and Khalid A. Hussein. "Image encryption algorithm based on the density and 6D logistic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1903. http://dx.doi.org/10.11591/ijece.v13i2.pp1903-1913.
Full textMao, Ying. "Algorithm of Encrypting Digital Image Using Chaos Neural Network." Advances in Multimedia 2022 (September 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/4160083.
Full textChen, Meixi. "Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm." Complexity 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/7212688.
Full textCheddour, Zakariae, Abdelhakim Chillali, and Ali Mouhib. "Generalized Fibonacci Sequences for Elliptic Curve Cryptography." Mathematics 11, no. 22 (2023): 4656. http://dx.doi.org/10.3390/math11224656.
Full textGAATA, Methaq Talib, and Fadya Fouad Hantoosh. "Encrypted Image Retrieval System based on Features Analysis." Al-Mustansiriyah Journal of Science 28, no. 3 (2018): 166. http://dx.doi.org/10.23851/mjs.v28i3.77.
Full textZhang, Shijie, Lingfeng Liu, and Hongyue Xiang. "A Novel Plain-Text Related Image Encryption Algorithm Based on LB Compound Chaotic Map." Mathematics 9, no. 21 (2021): 2778. http://dx.doi.org/10.3390/math9212778.
Full textZhou, Hao, and Haochang Bi. "Wireless Sensor Network Security Based on Improved Identity Encryption." Scientific Programming 2022 (April 1, 2022): 1–10. http://dx.doi.org/10.1155/2022/2308825.
Full textIbrahim, Dina, Kareem Ahmed, Mohamed Abdallah, and AbdElmgeid A. Ali. "A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix." Cryptography 6, no. 2 (2022): 28. http://dx.doi.org/10.3390/cryptography6020028.
Full textYuan, Ke, Peng Sang, Suya Zhang, Xi Chen, Wei Yang, and Chunfu Jia. "An electronic voting scheme based on homomorphic encryption and decentralization." PeerJ Computer Science 9 (October 18, 2023): e1649. http://dx.doi.org/10.7717/peerj-cs.1649.
Full textEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Full textROZLOMII, Inna. "METHOD OF CONSTRUCTION MATRIX CARDANO’S GRIDS FOR COMPRESSION OF INFORMATION." Herald of Khmelnytskyi National University 305, no. 1 (2022): 84–89. http://dx.doi.org/10.31891/2307-5732-2022-305-1-84-89.
Full textGupta, Dr Vikram. "Recent Advancements in Computer Science: A Comprehensive Review of Emerging Technologies and Innovations." International Journal for Research Publication and Seminars 14, no. 1 (2023): 329–34. http://dx.doi.org/10.36676/jrps.2023-v14i1-42.
Full textMeyer, Helen. "Decoding encryption policy." Computers & Security 15, no. 3 (1996): 225. http://dx.doi.org/10.1016/s0167-4048(96)90310-7.
Full textZhao, Zichun. "Evolution of the encryption and analysis of algorithm." Applied and Computational Engineering 52, no. 1 (2024): 292–95. http://dx.doi.org/10.54254/2755-2721/52/20241674.
Full textAbdalla, Michel, Mihir Bellare, and Gregory Neven. "Robust Encryption." Journal of Cryptology 31, no. 2 (2017): 307–50. http://dx.doi.org/10.1007/s00145-017-9258-8.
Full text