Academic literature on the topic 'Encryption systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encryption systems"
Yang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Full textYou, Weijing, Lei Lei, Bo Chen, and Limin Liu. "What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage." Information 12, no. 4 (2021): 142. http://dx.doi.org/10.3390/info12040142.
Full textRao, Kanusu Srinivasa, and Mandapati Sridhar. "A Novel Image Encryption Using Parity Based Visual Cryptography." Ingénierie des systèmes d information 26, no. 1 (2021): 135–42. http://dx.doi.org/10.18280/isi.260115.
Full textDong, Jie, Guowei Wu, Tingting Yang, and Yangyang Li. "The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs." Sensors 18, no. 10 (2018): 3430. http://dx.doi.org/10.3390/s18103430.
Full textKhaleel, Amal Hameed, and Iman Q. Abduljaleel. "Chaotic Image Cryptography Systems: A Review." Samarra Journal of Pure and Applied Science 3, no. 2 (2021): 129–43. http://dx.doi.org/10.54153/sjpas.2021.v3i2.244.
Full textNhan, Nguyen Trong, and Ye Dengpan. "A NEW COMBINATION METHOD FOR ENCRYPTION OF MOVING OBJECTS DETECTION IN VIDEO." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 1 (2017): 7548–51. http://dx.doi.org/10.24297/ijct.v16i1.5771.
Full textShmueli, Erez, Ronen Vaisenberg, Yuval Elovici, and Chanan Glezer. "Database encryption." ACM SIGMOD Record 38, no. 3 (2010): 29–34. http://dx.doi.org/10.1145/1815933.1815940.
Full textAriffin, Suriyani, Ramlan Mahmod, Azmi Jaafar, and Muhammad Rezal Kamel Ariffin. "Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems." International Journal of Natural Computing Research 3, no. 1 (2012): 56–72. http://dx.doi.org/10.4018/jncr.2012010105.
Full textZhao, Yue, and Lingfeng Liu. "A Bit Shift Image Encryption Algorithm Based on Double Chaotic Systems." Entropy 23, no. 9 (2021): 1127. http://dx.doi.org/10.3390/e23091127.
Full textZhang, Xuncai, Lingfei Wang, Guangzhao Cui, and Ying Niu. "Entropy-Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems." International Journal of Optics 2019 (August 15, 2019): 1–13. http://dx.doi.org/10.1155/2019/3594534.
Full textDissertations / Theses on the topic "Encryption systems"
Ahlström, Henrik, and Karl-Johan Skoglund. "Encryption in Delocalized Access Systems." Thesis, Linköping University, Department of Science and Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10528.
Full textDenning, Daniel. "Encryption systems for FPGA computing." Thesis, University of Glasgow, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438606.
Full textGoodman, James R. (James Ross). "Low power scalable encryption for wireless systems." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/10646.
Full textMoulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.
Full textEinicke, Garry A. "Random bit interleaving for trunk link encryption /." Title page, abstract and contents only, 1990. http://web4.library.adelaide.edu.au/theses/09EN/09ene35.pdf.
Full textElkouny, Abdel-latif Ahmed Abdel-latif. "Real time secure communications using chaotic encryption systems." Thesis, University of Kent, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274326.
Full textJeddi, Zahra. "A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems." Thesis, University of Louisiana at Lafayette, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3687692.
Full textShehata, Ahmed Alaael-Din Rohiem. "Secure computer communications and databases using chaotic encryption systems." Thesis, University of Kent, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.324713.
Full textTandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.
Full textZhou, Jiantao. "Multimedia lightweight encryption via randomized entropy coding /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?ECED%202009%20ZHOU.
Full textBooks on the topic "Encryption systems"
Edin, Muharemagic, and Socek Daniel, eds. Multimedia encryption and watermarking. Springer, 2005.
Find full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textLian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Encryption facility for z/OS version 1.10. IBM, International Technical Support Organization, 2007.
Find full textA, Peirce M., and Tewari Hitesh, eds. Electronic payment systems. Artech House, 1997.
Find full text1965-2004, Bartolini Franco, ed. Watermarking systems engineering: Enabling digital assets security and other applications. Marcel Dekker, 2004.
Find full textEncryption facility for z/OS V1.2 OpenPGP support. International Business Machines Corporation, 2007.
Find full textTamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Information Science Reference, 2012.
Find full textO'Mahony, Donal. Electronic payment systems for e-commerce. 2nd ed. Artech House, 2001.
Find full textMcLoone, Máire. System-on-Chip Architectures and Implementations for Private-Key Data Encryption. Springer US, 2003.
Find full textBook chapters on the topic "Encryption systems"
Donovan, Peter, and John Mack. "Major Encryption Systems." In Code Breaking in the Pacific. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08278-3_8.
Full textLi, Ninghui. "Symmetric Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1484.
Full textLi, Ninghui. "Asymmetric Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1485.
Full textLi, Ninghui. "Homomorphic Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1486.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_98.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_98.
Full textLi, Ninghui. "Symmetric Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1484.
Full textLi, Ninghui. "Asymmetric Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1485.
Full textLi, Ninghui. "Homomorphic Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1486.
Full textLi, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_98-2.
Full textConference papers on the topic "Encryption systems"
Teufl, Peter, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, and Thomas Zefferer. "Android encryption systems." In 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS). IEEE, 2014. http://dx.doi.org/10.1109/prisms.2014.6970599.
Full textMosa, E., Nagy W. Messiha, and O. Zahran. "Random encryption of speech signal." In Systems (ICCES). IEEE, 2009. http://dx.doi.org/10.1109/icces.2009.5383253.
Full textAlomari, Mohammad Ahmed, Khairulmizam Samsudin, and Abdul Rahman Ramli. "A Study on Encryption Algorithms and Modes for Disk Encryption." In 2009 International Conference on Signal Processing Systems. IEEE, 2009. http://dx.doi.org/10.1109/icsps.2009.118.
Full textKumari, K. Sudha, and C. Nagaraju. "DNA Encrypting rules with Chaotic Maps for Medical Image Encryption." In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432176.
Full textSubbulakshmi, T., Suryansh Bhardwai, Prakhar Ranjan, and Kenneth Antony John. "Enhanced SPK Encryption Algorithm for File Encryption Using Java." In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2018. http://dx.doi.org/10.1109/iccons.2018.8662910.
Full textNaeem, Ensherah A., Mustafa M. Abd Elnaby, and Mohiy M. Hadhoud. "Chaotic image encryption in transform domains." In Systems (ICCES). IEEE, 2009. http://dx.doi.org/10.1109/icces.2009.5383309.
Full textZhang, Minqing, Xu An Wang, Xiaoyuan Yang, and Weiyi Cai. "Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.82.
Full textBijlani, Harsh, Dikshant Gupta, and Mayank Lovanshi. "Audio Encryption Optimization." In 2018 8th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2018. http://dx.doi.org/10.1109/csnt.2018.8820275.
Full textZaw, Than Myo, Min Thant, and S. V. Bezzateev. "Database Security with AES Encryption, Elliptic Curve Encryption and Signature." In 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2019. http://dx.doi.org/10.1109/weconf.2019.8840125.
Full textKhan, Saif Ali, R. K. Aggarwal, and Shashidhar Kulkarni. "Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data." In 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). IEEE, 2019. http://dx.doi.org/10.1109/icaccs.2019.8728427.
Full textReports on the topic "Encryption systems"
Arnold, J., T. Ambrosi, and W. Geer. Security Dynamics Access Control Encryption System. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada221814.
Full textKeller, S. S. Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) :. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-20.
Full text