Academic literature on the topic 'Encryption protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encryption protocols"
Kuo, Tzu-Hsiang, and Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol." Mathematics 11, no. 5 (2023): 1227. http://dx.doi.org/10.3390/math11051227.
Full textVegesna, Rohith Varma. "Developing Encrypted Communication Protocols for Fuel Controllers." International Scientific Journal of Engineering and Management 01, no. 01 (2022): 1–6. https://doi.org/10.55041/isjem00100.
Full textLiu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue, and Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane." Electronics 11, no. 15 (2022): 2389. http://dx.doi.org/10.3390/electronics11152389.
Full textLabinsky, Alexander. "FEATURES OF CRYPTOGRAPHIC PROTOCOLS." NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, no. 1 (2024): 53–59. http://dx.doi.org/10.61260/2307-7476-2024-1-53-59.
Full textHariKrishna, A., Devasani Bindu, Cherukuru Sowmya, Gumparlapati Varshitha, and Challagundla Tharunasree. "Enhanced Secure Communication Protocol with Pipelined Advanced Encryption for Mobile Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 15, no. 1 (2024): 205–11. http://dx.doi.org/10.61841/turcomat.v15i1.14613.
Full textLi, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Full textKrishna, Kalluri Rama, and C. V. Guru Rao. "ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments." International Journal of Information Security and Privacy 16, no. 2 (2022): 1–15. http://dx.doi.org/10.4018/ijisp.310515.
Full textLi, Yan, and Yifei Lu. "ETCC: Encrypted Two-Label Classification Using CNN." Security and Communication Networks 2021 (March 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6633250.
Full textJiang, Lili, and Hui Cui. "Private and Mutual Authentication Protocols for Internet of Things." Mathematics 11, no. 8 (2023): 1929. http://dx.doi.org/10.3390/math11081929.
Full textGavrilova, Alla, Iryna Aksonova, Yuliia Khokhlachova, Tetiana Milevska, and Sergii Dunaiev. "RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY." Ukrainian Scientific Journal of Information Security 30, no. 1 (2024): 130–39. http://dx.doi.org/10.18372/2225-5036.30.18614.
Full textDissertations / Theses on the topic "Encryption protocols"
Tang, Qiang. "Key establishment protocols and time-release encryption schemes." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.498266.
Full textPetrakos, Nikolaos. "Cube-type algebraic attacks on wireless encryption protocols." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FPetrakos.pdf.
Full textKuchta, Veronika. "Distributed protocols for digital signatures and public key encryption." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/812960/.
Full textMaimuţ, Diana Ştefania. "Authentication and encryption protocols : design, attacks and algorithmic improvements." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0047/document.
Full textLippold, Georg. "Encryption schemes and key exchange protocols in the certificateless setting." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41697/1/Georg_Lippold_Thesis.pdf.
Full textTryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.
Full textZhang, Zheshen. "Quantum key distribution protocols with high rates and low costs." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28240.
Full textNorman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textWright, Moriah E. "RSA, Public-Key Cryptography, and Authentication Protocols." Youngstown State University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1339297480.
Full textBian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Full textBooks on the topic "Encryption protocols"
Lek, Kamol. Cryptography: Protocols, design, and applications. Nova Science Publishers, 2011.
Find full textWaldvogel, Christian P. On the nature of authentication protocols. Hartung-Gorre, 1997.
Find full textservice), SpringerLink (Online, ed. RFID Security and Privacy: Concepts, Protocols, and Architectures. Springer-Verlag Berlin Heidelberg, 2008.
Find full textChristianson, Bruce. Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textYan, Zhang, and SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Springer-Verlag US, 2009.
Find full textChristianson, Bruce. Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Springer Berlin Heidelberg, 2010.
Find full textInternational Workshop on Security Protocols (14th 2006 Cambridge, England). Security protocols: 14th international workshop, Cambridge, March 27-29 2006, revised selected papers. Edited by Christianson Bruce. Springer, 2009.
Find full textBruno, Crispo, Malcolm James, Stajano Frank, and SpringerLink (Online service), eds. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textChristianson, Bruce. Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textChristianson, Bruce. Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textBook chapters on the topic "Encryption protocols"
Couteau, Geoffroy, Thomas Peters, and David Pointcheval. "Encryption Switching Protocols." In Advances in Cryptology – CRYPTO 2016. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53018-4_12.
Full textGligor, Virgil D., and Pompiliu Donescu. "Integrity-Aware PCBC Encryption Schemes." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_22.
Full textGligor, Virgil. "Integrity-Aware PCBC Encryption Schemes." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_23.
Full textMaffei, Ivo, and Andrew W. Roscoe. "Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding." In Financial Cryptography and Data Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47754-6_6.
Full textRamkumar, Mahalingam. "Broadcast Authentication and Broadcast Encryption." In Symmetric Cryptographic Protocols. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07584-6_8.
Full textRamsdell, John D. "Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran." In Protocols, Strands, and Logic. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91631-2_20.
Full textBrož, Milan. "Extending Full Disk Encryption for the Future." In Security Protocols XXV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_13.
Full textBrož, Milan. "Extending Full Disk Encryption for the Future (Transcript of Discussion)." In Security Protocols XXV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_14.
Full textCrescenzo, Giovanni Di, and Olga Kornievskaia. "Efficient Re-keying Protocols for Multicast Encryption." In Security in Communication Networks. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36413-7_9.
Full textMorozov, Kirill, and Tsuyoshi Takagi. "Zero-Knowledge Protocols for the McEliece Encryption." In Information Security and Privacy. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31448-3_14.
Full textConference papers on the topic "Encryption protocols"
Krishna Reddy, B. N., Santosh Kumar Singh, and Surendra Yadav. "The Role of Applied Cryptography in Current Encryption Protocols." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724980.
Full textKodmelwar, Manohar K., Rohit Kumar, Jagtej Singh, Ritesh Kumar, T. Ramachandran, and G. Ramya. "An Advanced Encryption Protocols for Wireless Network Security in Web Applications." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725848.
Full textZhao, Liangxiao, Gang Li, Pengjun Wang, Xuejiao Ma, and Ziyu Zhou. "Dynamic-Matrix-Encryption Based Secure Strong PUF for Device Authentication Protocols." In 2024 IEEE 17th International Conference on Solid-State & Integrated Circuit Technology (ICSICT). IEEE, 2024. https://doi.org/10.1109/icsict62049.2024.10831393.
Full textSugadev, M., Shweta Singh, Deepak Minhas, Meenakshi Das, Divya Sharma, and Batani Raghavendra Rao. "Next-Generation Encryption Protocols for Enhanced Data Privacy in Network Communications." In 2025 International Conference on Automation and Computation (AUTOCOM). IEEE, 2025. https://doi.org/10.1109/autocom64127.2025.10957454.
Full textRavi, Kiran Chand, Arokia Suresh Kumar Joseph, Satish Bojjawar, V. Samuthira Pandi, Veeraiyah Thangasamy, and S. Jayanthi. "5G Wireless Network Security: Investigating Next-Generation Mobile Communication Data Encryption Methods and Authentication Protocols." In 2025 3rd International Conference on Device Intelligence, Computing and Communication Technologies (DICCT). IEEE, 2025. https://doi.org/10.1109/dicct64131.2025.10986591.
Full textIlias, Irma Syarlina Che, Sera Syarmila Sameon, Muhammad Zaqwan Ezzad Zulkifli, and Mohammad Zahir Mat Salleh. "Optimizing VPN Security in Financial Services: Implementing 256-Bit Encryption and Tunneling Protocols for Secure Data Transmission." In 2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM). IEEE, 2025. https://doi.org/10.1109/imcom64595.2025.10857544.
Full textDemir, Busranur Bulbul, and Deniz Turgay Altilar. "Distributed Proxy Re- Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption." In 2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 2024. http://dx.doi.org/10.1109/blackseacom61746.2024.10646222.
Full textMoltafet, Mohammad, Hamid R. Sadjadpour, and Zouheir Rezki. "An Unconditionally Secure Encryption Protocol for Cloud Storage." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619595.
Full textStephanides, George. "Short-Key Certificateless Encryption." In Privacy: Devices, Protocols, and Applications. IEEE, 2011. http://dx.doi.org/10.1109/lightsec.2011.13.
Full textKoganti, Venkata SreeKrishna, Lavanya K. Galla, Nagarjuna Nuthalapati, and Anil Varma Kakarlapudi. "Authentication protocols using encryption techniques." In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2016. http://dx.doi.org/10.1109/iccicct.2016.7987921.
Full textReports on the topic "Encryption protocols"
Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Full textPerdigão, Rui A. P. Neuro-Quantum Cyber-Physical Intelligence (NQCPI). Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/241024.
Full textMeyer, G. The PPP Encryption Control Protocol (ECP). RFC Editor, 1996. http://dx.doi.org/10.17487/rfc1968.
Full textSklower, K., and G. Meyer. The PPP DES Encryption Protocol (DESE). RFC Editor, 1996. http://dx.doi.org/10.17487/rfc1969.
Full textKummert, H. The PPP Triple-DES Encryption Protocol (3DESE). RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2420.
Full textPall, G., and G. Zorn. Microsoft Point-To-Point Encryption (MPPE) Protocol. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3078.
Full textSklower, K., and G. Meyer. The PPP DES Encryption Protocol, Version 2 (DESE-bis). RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2419.
Full textKastenholz, F. Variance for The PPP Compression Control Protocol and The PPP Encryption Control Protocol. RFC Editor, 1996. http://dx.doi.org/10.17487/rfc1915.
Full textJennings, C., P. Jones, R. Barnes, and A. B. Roach. Double Encryption Procedures for the Secure Real-Time Transport Protocol (SRTP). RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8723.
Full textRobson, Christopher L. Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada474926.
Full text