Academic literature on the topic 'Encryption process'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption process.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encryption process"
Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Full textHuda Anwar and Zill e Shams. "Algorithms of Encryption Using Graph Theory." Mathematical Sciences and Applications 2, no. 2 (2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.
Full textAgarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.
Full textAbeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Full textLi, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.
Full textLimbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.
Full textAbdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites." Security and Communication Networks 2021 (December 24, 2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.
Full textLiu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.
Full textNori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Full textMilian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.
Full textDissertations / Theses on the topic "Encryption process"
Siddiqi, Saad Ahmed. "Smart Card Packaging Process Control System." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-100020.
Full textHenry, Tiphaine. "Towards trustworthy, flexible, and privacy-preserving peer-to-peer business process management systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS024.
Full textDu, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textAgrawa], Sourav Kumar. "High security image encryption by 3stage process." Thesis, 2014. http://ethesis.nitrkl.ac.in/6467/1/E-46.pdf.
Full textCHIU, CHUN-YIN, and 邱俊尹. "A Study on User Account Login Process Bases on Symmetric Block Encryption Scheme with Pseudo Random Number Measures." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/nsxc59.
Full textChego, Lloyd. "Whether using encryption in SCADA systems, the services performance requirements are still met in OT IT environment over an MPLS core network?" Thesis, 2016. http://hdl.handle.net/10539/21050.
Full textBooks on the topic "Encryption process"
Sanín-Restrepo, Ricardo, Marinella Machado-Araujo, and Sabelo J. Ndlovu-Gatsheni, eds. Decrypting Justice. Lexington Books, 2025. https://doi.org/10.5040/9781978748538.
Full textBook chapters on the topic "Encryption process"
Daemen, Joan, and Vincent Rijmen. "The Advanced Encryption Standard Process." In Information Security and Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04722-4_1.
Full textDaemen, Joan, and Vincent Rijmen. "The Advanced Encryption Standard Process." In Information Security and Cryptography. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-60769-5_1.
Full textFirdous, Saltanat, Asutosh Brahma, Arjun Menon, and Chester Rebeiro. "CoPrIME: Complete Process Isolation Using Memory Encryption." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-80408-3_7.
Full textWeissbaum, François, and Thomas Lugrin. "Symmetric Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_2.
Full textRafiei, Majid, Leopold von Waldthausen, and Wil M. P. van der Aalst. "Supporting Confidentiality in Process Mining Using Abstraction and Encryption." In Lecture Notes in Business Information Processing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46633-6_6.
Full textMüller, Belinda. "Authentication." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_29.
Full textChen, Xuguang, Hongbin Ma, Pujun Ji, Haiting Liu, and Yan Liu. "Based on GAN Generating Chaotic Sequence." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_4.
Full textAad, Imad. "Zero-Knowledge Proof." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_6.
Full textMaru, Umesh, Gajendra Sujediya, and Yashika Saini. "Color Image Encryption and Compression Using DCT in Joint Process." In Algorithms for Intelligent Systems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5077-5_9.
Full textBhatt, Vineet, Raj Kishor Bisht, and Rajesh Kumar Tripathi. "An image encryption and decryption process using singular value decomposition." In Automation and Computation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003333500-12.
Full textConference papers on the topic "Encryption process"
Ariffin, Ahmad Luqman Bin Ahmad Kamal, and Kishan Vasuthevan. "The Development of Hybrid Technique for Encryption Application." In 2024 IEEE 12th Conference on Systems, Process & Control (ICSPC). IEEE, 2024. https://doi.org/10.1109/icspc63060.2024.10861952.
Full textNaumov, I. D., and A. S. Popov. "MODELING OF THE ENCRYPTION PROCESS IN MATLAB." In Actual problems of physical and functional electronics. Ulyanovsk State Technical University, 2023. http://dx.doi.org/10.61527/appfe-2023.50-52.
Full textFurka, Matus, Karol Kis, Martin Klauco, and Michal Kvasnica. "Usage of Homomorphic Encryption Algorithms in Process Control." In 2021 23rd International Conference on Process Control (PC). IEEE, 2021. http://dx.doi.org/10.1109/pc52310.2021.9447536.
Full textKalúz, Martin, Roman Kohút, and Diana Dzurková. "MPC-Mimicking Neural Network Based on Homomorphic Encryption." In 2023 24th International Conference on Process Control (PC). IEEE, 2023. http://dx.doi.org/10.1109/pc58330.2023.10217518.
Full textGao, Haiying, and Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption." In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.
Full textHuang, C. K., Y. H. Hsu, W. Y. Chen, et al. "High security image encryption by two-stage process." In Signal Processing (ICICS). IEEE, 2009. http://dx.doi.org/10.1109/icics.2009.5397629.
Full textZainuddin, Zahir, and Evanita V. Manullang. "E-lerning concept design of rijndael encryption process." In 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE). IEEE, 2013. http://dx.doi.org/10.1109/tale.2013.6654535.
Full textChang, Rui, Liehui Jiang, Hongqi He, and Yun Zeng. "The process analysis of encryption and decryption based on process dependency graphs." In 2013 International Conference on Sport Science and Computer Science. WIT Press, 2014. http://dx.doi.org/10.2495/cccs130041.
Full textTep, Sovan, and Isara Anantavrasilp. "Robust Image Encryption Method With Cipher Stream Chaining Process." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821734.
Full textMarshnil, N. Ameena, and M. C. Binish. "Image encryption based on diffusion process and multiple chaotic maps." In 2014 International Conference on Power Signals Control and Computations (EPSCICON). IEEE, 2014. http://dx.doi.org/10.1109/epscicon.2014.6887501.
Full textReports on the topic "Encryption process"
Schaad, J. CBOR Object Signing and Encryption (COSE): Structures and Process. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9052.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Full textSonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.
Full text