Journal articles on the topic 'Encryption process'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Encryption process.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Full textHuda Anwar and Zill e Shams. "Algorithms of Encryption Using Graph Theory." Mathematical Sciences and Applications 2, no. 2 (2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.
Full textAgarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.
Full textAbeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Full textLi, Guang Shi. "Research on Encryption Method of the GML Spatial Data in Geographic Information Sharing System." Advanced Materials Research 756-759 (September 2013): 1506–10. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1506.
Full textLimbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.
Full textAbdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites." Security and Communication Networks 2021 (December 24, 2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.
Full textLiu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.
Full textNori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Full textMilian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.
Full textZhang, Zhenhua, Deqi Huang, Yating Tu, and Zikuang Ye. "Layer multiplexing and DNA based color image encryption." Journal of Physics: Conference Series 2858, no. 1 (2024): 012039. http://dx.doi.org/10.1088/1742-6596/2858/1/012039.
Full textWu, Yuchen. "Theoretical Analysis of AES Encryption Optimization Based on Quaternions and Rotation Matrices." Theoretical and Natural Science 100, no. 1 (2025): 75–82. https://doi.org/10.54254/2753-8818/2025.21702.
Full textAlrayes, Fatma S., Latifah Almuqren, Abdullah Mohamed, and Mohammed Rizwanullah. "Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment." AIMS Mathematics 9, no. 6 (2024): 16093–115. http://dx.doi.org/10.3934/math.2024779.
Full textRanasinghe, Rajitha, Madusha Chathurangi, and Pabasara Athukorala. "A novel improvement in RSA algorithm." Journal of Discrete Mathematical Sciences & Cryptography 27, no. 1 (2024): 143–50. http://dx.doi.org/10.47974/jdmsc-1628.
Full textSusanto, Arief, Tutik Khotimah, Muhammad Taufik Sumadi, Joko Warsito, and Rihartanto . "Image encryption using vigenere cipher with bit circular shift." International Journal of Engineering & Technology 7, no. 2.2 (2018): 62. http://dx.doi.org/10.14419/ijet.v7i2.2.12734.
Full textAli Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.
Full textAl-khafaji, Baydaa-Jaffer. "An approach for encrypting images using a four-dimensional logistic map." Wasit Journal for Pure sciences 3, no. 2 (2024): 140–45. http://dx.doi.org/10.31185/wjps.343.
Full textIrzayzah, Mr Samyrah M. Abu. "A New Application for Encryption and Decryption Using the TAS Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 2428–44. http://dx.doi.org/10.22214/ijraset.2023.56928.
Full textNamdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.
Full textPhyu, Phyu Thwe. "Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function." International Journal of Advances in Scientific Research and Engineering (ijasre) 5, no. 10 (2019): 192–203. https://doi.org/10.31695/IJASRE.2019.33560.
Full textJamil, Abeer Salim, Nidaa Flaih Hassan, and Raghad Abdulaali Azeez. "Face Encryption based on Feature Extraction Supported by Canny Edge Detector." Webology 19, no. 1 (2022): 1716–30. http://dx.doi.org/10.14704/web/v19i1/web19115.
Full textSaeed, Muhammad, Hafiz Inam Ul Haq, Mubashir Ali, and Mudassira Mustafa. "Innovative Soft Cryptosystem for Encrypting and Decrypting Messages with IDEA." Sustainable Machine Intelligence Journal 9 (October 1, 2024): 89–101. http://dx.doi.org/10.61356/smij.2024.9385.
Full textRamadhani, Argia Putri, Nanda Putri Tami, Asih Lestari, and Moh Erkamim. "Layered security model through integration of Vigenere and Hill Cipher in digital message encryption." Journal of Information System and Application Development 2, no. 2 (2024): 144–56. http://dx.doi.org/10.26905/jisad.v2i2.14005.
Full textWang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (2022): 9929. http://dx.doi.org/10.3390/s22249929.
Full textYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Full textPatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Full textSharma, Gaurav, Mandeep Chaudhary, Hariom Kumar, and Dr Ajay Sahu. "Machine Learning and Secure Image Transmission for Disease Forecasting." International Research Journal of Computer Science 11, no. 11 (2024): 652–58. https://doi.org/10.26562/irjcs.2024.v1111.04.
Full textSari, Festy Winda, and Ummi Aisha Ibrahim. "IMAGE ENCRYPTION USING COMBINATION OF CHAOTIC SYSTEM." JOURNAL OF APPLIED MULTIMEDIA AND NETWORKING 8, no. 1 (2024): 1–8. http://dx.doi.org/10.30871/jamn.v8i1.7940.
Full textBozduman, Hanife Çağıl, and Erkan Afacan. "Simulation of a Homomorphic Encryption System." Applied Mathematics and Nonlinear Sciences 5, no. 1 (2020): 479–84. http://dx.doi.org/10.2478/amns.2020.1.00046.
Full textQin, Ying, and Bob Zhang. "Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal." Applied Sciences 13, no. 14 (2023): 8117. http://dx.doi.org/10.3390/app13148117.
Full textMa, Haiyun, and Zhonglin Zhang. "A New Private Information Encryption Method in Internet of Things under Cloud Computing Environment." Wireless Communications and Mobile Computing 2020 (September 15, 2020): 1–9. http://dx.doi.org/10.1155/2020/8810987.
Full textHuang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.
Full textGulfraz Naqvi, Muhammad Burhan Umar, and Saqib Ali. "Quantum Computing: Principles of Breaking Encryption." JOURNAL OF NANOSCOPE (JN) 4, no. 2 (2023): 83–96. http://dx.doi.org/10.52700/jn.v4i2.95.
Full textA. Rashid, Abdullah, and Khalid A. Hussein. "Image encryption algorithm based on the density and 6D logistic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1903. http://dx.doi.org/10.11591/ijece.v13i2.pp1903-1913.
Full textAbdullah, A. Rashid, and Ali Hussein Khalid. "Image encryption algorithm based on the density and 6D logistic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1903–13. https://doi.org/10.11591/ijece.v13i2.pp1903-1913.
Full textAbu-Faraj, Mua’ad, Abeer Al-Hyari, and Ziad Alqadi. "A DUAL APPROACH TO DIGITAL AUDIO SIGNAL CRYPTOGRAPHY." Journal of Southwest Jiaotong University 57, no. 1 (2022): 24–33. http://dx.doi.org/10.35741/issn.0258-2724.57.1.3.
Full textYongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan, and Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process." Security and Communication Networks 2022 (May 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.
Full textChen, Jie, Xin Zhou, Xing Bai, Cong Li, Zhao Xu, and Yang Ni. "Equivalence analysis of highly scattering process and double random phase encryption process." Acta Physica Sinica 70, no. 13 (2021): 134201. http://dx.doi.org/10.7498/aps.70.20201903.
Full textSastya Hendri Wibowo and Diana Diana. "Analisis Dan Implementasi Algoritma Rivest Code-5 Pada Keamanan Data." Jurnal Penelitian Teknologi Informasi dan Sains 1, no. 1 (2023): 09–21. http://dx.doi.org/10.54066/jptis-itb.v1i1.187.
Full textWu, Yuan, and Xiao Chun Chen. "File Transparent Encryption System Design Based on Security Directory." Applied Mechanics and Materials 433-435 (October 2013): 1742–46. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1742.
Full textIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Full textJaber, Mohanad J., Zahraa Jasim Jaber, and Ahmed J. Obaid. "An efficient hybrid chaotic map-based encryption technique for multiple image security systems." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 5 (2024): 1507–22. http://dx.doi.org/10.47974/jdmsc-1934.
Full textVasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.
Full textPan, Jingshan, Tongtong Sui, Wen Liu, et al. "Secure Control of Linear Controllers Using Fully Homomorphic Encryption." Applied Sciences 13, no. 24 (2023): 13071. http://dx.doi.org/10.3390/app132413071.
Full textRohmah, Ahlam Umniyatur, and Djuniadi Djuniadi. "Tiny encryption algorithm (TEA) for analysis and implementation of cryptool2-based text message encryption and decryption processes." Journal of Student Research Exploration 1, no. 1 (2022): 33–40. http://dx.doi.org/10.52465/josre.v1i1.111.
Full textGaurav Agarwal, Mohammed Shakeel, Akash Sanghi, YDS Arya,. "A Novel Security Model for Password Encryption Using Aadhaar and Amicable Number." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 1096–107. http://dx.doi.org/10.52783/tjjpt.v44.i4.981.
Full textTomasouw, Berny Pebo, Glevi E. Mado, and Elvinus R. Persulessy. "MATRIKS SCORE DAN APLIKASINYA DALAM PENGAMANAN PESAN RAHASIA." BAREKENG: JURNAL ILMU MATEMATIKA DAN TERAPAN 12, no. 2 (2018): 107–16. http://dx.doi.org/10.30598/vol12iss2pp107-116ar623.
Full textWANG, XING-YUAN, and YISONG TAN. "A MULTIPLE-PLAINTEXTS-ORIENTED CHAOTIC CRYPTOSYSTEM." International Journal of Modern Physics B 27, no. 32 (2013): 1350202. http://dx.doi.org/10.1142/s0217979213502020.
Full textBajaj, Harshita, Parnab Das, and Santanu Mandal. "Chaos Based Novel Video Encryption Scheme to Secure Video/Image Information from Any AI-Generated Attacks." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 1 (2024): 1–20. http://dx.doi.org/10.37934/araset.50.1.120.
Full textSri, Wayun Waradani, Sutardi, and Statiswaty. "APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA TRIPLE-DES DAN PENGUJIAN SERANGAN DENGAN METODE SNIFFING." semanTIK 5, no. 1 (2019): 113–20. https://doi.org/10.5281/zenodo.3227231.
Full text