Academic literature on the topic 'Encryption systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Encryption systems"

1

Yang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.

Full text
Abstract:
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. Different categories of information hiding methodologies, as well as data embedding and watermarking strategies for digital video contents, will be reviewed. A joint cryptograph-steganography methodology, which combines both encryption and information hiding techniques to ensure patient information security and privacy in medical images, is also presented.
APA, Harvard, Vancouver, ISO, and other styles
2

You, Weijing, Lei Lei, Bo Chen, and Limin Liu. "What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage." Information 12, no. 4 (2021): 142. http://dx.doi.org/10.3390/info12040142.

Full text
Abstract:
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problematic as encryption performed by different data owners may differentiate identical data which may then become not deduplicable. The Message-Locked Encryption (MLE) is thus utilized to derive the same encryption key for the identical data, by which the encrypted data are still deduplicable after being encrypted by different data owners. As keys may be leaked over time, re-encrypting outsourced data is of paramount importance to ensure continuous confidentiality, which, however, has not been well addressed in the literature. In this paper, we design SEDER, a SEcure client-side Deduplication system enabling Efficient Re-encryption for cloud storage by (1) leveraging all-or-nothing transform (AONT), (2) designing a new delegated re-encryption (DRE), and (3) proposing a new proof of ownership scheme for encrypted cloud data (PoWC). Security analysis and experimental evaluation validate security and efficiency of SEDER, respectively.
APA, Harvard, Vancouver, ISO, and other styles
3

Rao, Kanusu Srinivasa, and Mandapati Sridhar. "A Novel Image Encryption Using Parity Based Visual Cryptography." Ingénierie des systèmes d information 26, no. 1 (2021): 135–42. http://dx.doi.org/10.18280/isi.260115.

Full text
Abstract:
The current era is mainly focused on secured data transmission and every organization takes preventive measures to protect network’s private data. Among different techniques visual cryptography is a prominent one that that encrypts the visual information and decrypts secret using mechanical operations without any computation, but each share need pixel expansion. In the current work, we propose an Image encryption technique using (n, n) Visual cryptography based on simple operations without pixel expansion. The proposed novel technique gives an image encryption using visual cryptography based on Least significant bit (LSB) technique in spatial domain and parity mechanism using Exclusive-OR(XOR) operation. developed for encrypting grey scale image. Image encryption and decryption uses simple Boolean operations. The technique provides better quality of shares and recovers without any loss.
APA, Harvard, Vancouver, ISO, and other styles
4

Dong, Jie, Guowei Wu, Tingting Yang, and Yangyang Li. "The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs." Sensors 18, no. 10 (2018): 3430. http://dx.doi.org/10.3390/s18103430.

Full text
Abstract:
With the deepening of modern military reforms, information has become the key to winning modern warfare. The use of unmanned aerial vehicle (UAV) to capture image information has become an important means of reconnaissance in modern warfare and plays an irreplaceable role. The image information usually uses a wireless image transmission system, since image information is intercepted or stolen easily during the information transmission, encrypting an image is a common method for ensuring image security. However, traditional encryption algorithms have some deficiencies in terms of efficiency and security. In order to overcome these shortcomings, a new algorithm is proposed in this paper-an improved image scrambling encryption algorithm based on Fibonacci-p coding. The first new idea of the algorithm is to separate the positive and negative signs and data of the scrambled DCT coefficients, then form the symbol matrix and the data matrix respectively, perform the scrambling encryption operation on the symbol matrix. The second new idea is to encrypt the color RGB image by converting the R, G, and B colors into Y, Cb, and Cr, and converting the normal image operation into operations on Y, Cb, and Cr, thereby implementing the encryption operation. The comprehensive performance of the algorithm is optimal with different image information. Experiments results validate the favorable performance of the proposed improved encryption algorithm.
APA, Harvard, Vancouver, ISO, and other styles
5

Khaleel, Amal Hameed, and Iman Q. Abduljaleel. "Chaotic Image Cryptography Systems: A Review." Samarra Journal of Pure and Applied Science 3, no. 2 (2021): 129–43. http://dx.doi.org/10.54153/sjpas.2021.v3i2.244.

Full text
Abstract:
In recent decades, image encryption has been a popular and important field of research. The image encryption techniques have been studied thoroughly to ensure the safety of digital images on transmission through the networks. A large range of algorithms for chaotic-based cryptographic systems has been suggested and submitted to enhance the efficiency of the encryption methods. The chaotic map is one technique to guarantee security. The benefits of chaotic image encryption include the fact that it is simple to implement; it has a faster encryption speed, and it is powerful against attacks. Due to their extreme sensitivity to initial conditions, unpredictability, and random-like behaviours, many image encryption systems using chaotic maps have been proposed. This study paper presents a scientific review of many types of researches during the (2014-2020) years that used chaotic with its various types (one-dimensional, multi-dimensional, or hyper-chaotic) to process the digital images in the encryption stage or the scrambling phase. Furthermore, it presents a future reading of researches that has a wider role in developing the cryptography field by improving the efficiency of Algorithms where using a chaotic map with other methods gives better results than using chaotic alone in scrambling and encryption methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Nhan, Nguyen Trong, and Ye Dengpan. "A NEW COMBINATION METHOD FOR ENCRYPTION OF MOVING OBJECTS DETECTION IN VIDEO." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 1 (2017): 7548–51. http://dx.doi.org/10.24297/ijct.v16i1.5771.

Full text
Abstract:
Nowadays surveillance systems have been widely deployed in various places and generate massive amount of video data every day. This raises threats of unauthorized access and potential privacy leakage as the recorded videos usually contain rich identifiable information such as facial biometrics. In order to mitigate the threats, many existing methods perform symmetric encryption on the entire frames in the videos. Unfortunately, these methods could introduce additional computation cost and storage. Moreover, as surveillance systems could be a part of distributed system, the key management is critical and challenging. In this paper, we propose a novel method which incorporates background subtraction technique and RSA encryption algorithm. Rather than encrypting the entire frames of the videos, the proposed detect the regions around moving objects in the frames of video and then perform RSA encryption on the detected regions. And RSA encryption technique has its advantages of key distribution and management. Our experimental results show that the proposed method only involve moderate computation cost and storage.
APA, Harvard, Vancouver, ISO, and other styles
7

Shmueli, Erez, Ronen Vaisenberg, Yuval Elovici, and Chanan Glezer. "Database encryption." ACM SIGMOD Record 38, no. 3 (2010): 29–34. http://dx.doi.org/10.1145/1815933.1815940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ariffin, Suriyani, Ramlan Mahmod, Azmi Jaafar, and Muhammad Rezal Kamel Ariffin. "Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems." International Journal of Natural Computing Research 3, no. 1 (2012): 56–72. http://dx.doi.org/10.4018/jncr.2012010105.

Full text
Abstract:
In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. This paper identifies the correspondences and highlights the essential computation elements on the basis of randomness and non-linearity of immune systems. These systems can be applied in symmetric encryption algorithm that satisfies the properties in designing a new symmetric encryption block cipher. The proposed symmetric encryption block cipher called the 3D-AES uses components of the Advanced Encryption Standard (AES) symmetric encryption block cipher and the new core components based on immune systems approaches. To ensure adequate high security of the systems in the world of information technology, the laboratory experiment results are presented and analyzed. They show that the randomness and non-linearity of the output in the 3D-AES symmetric encryption block cipher are comparable to the AES symmetric encryption block cipher.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Yue, and Lingfeng Liu. "A Bit Shift Image Encryption Algorithm Based on Double Chaotic Systems." Entropy 23, no. 9 (2021): 1127. http://dx.doi.org/10.3390/e23091127.

Full text
Abstract:
A chaotic system refers to a deterministic system with seemingly random irregular motion, and its behavior is uncertain, unrepeatable, and unpredictable. In recent years, researchers have proposed various image encryption schemes based on a single low-dimensional or high-dimensional chaotic system, but many algorithms have problems such as low security. Therefore, designing a good chaotic system and encryption scheme is very important for encryption algorithms. This paper constructs a new double chaotic system based on tent mapping and logistic mapping. In order to verify the practicability and feasibility of the new chaotic system, a displacement image encryption algorithm based on the new chaotic system was subsequently proposed. This paper proposes a displacement image encryption algorithm based on the new chaotic system. The algorithm uses an improved new nonlinear feedback function to generate two random sequences, one of which is used to generate the index sequence, the other is used to generate the encryption matrix, and the index sequence is used to control the generation of the encryption matrix required for encryption. Then, the encryption matrix and the scrambling matrix are XORed to obtain the first encryption image. Finally, a bit-shift encryption method is adopted to prevent the harm caused by key leakage and to improve the security of the algorithm. Numerical experiments show that the key space of the algorithm is not only large, but also the key sensitivity is relatively high, and it has good resistance to various attacks. The analysis shows that this algorithm has certain competitive advantages compared with other encryption algorithms.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Xuncai, Lingfei Wang, Guangzhao Cui, and Ying Niu. "Entropy-Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems." International Journal of Optics 2019 (August 15, 2019): 1–13. http://dx.doi.org/10.1155/2019/3594534.

Full text
Abstract:
Traditional encryption algorithms are inefficient when applied to image encryption because image data have the characteristics of large data sizes and strong correlations between adjacent pixels. The shortcomings of the traditional Data encryption standard (DES) encryption algorithm when applied to image encryption are analyzed, and a new image encryption algorithm based on the traditional DES encryption algorithm model, chaotic systems, DNA computing, and select cipher-text output is proposed. Select cipher-text output selects cipher image with the biggest entropy, and it can increase the randomness of cipher image and reduce the risk of encryption system being broken down. This algorithm overcomes the shortcomings of high computational complexity and inconvenient key management that the traditional text encryption algorithm has when applied to image encryption. The experimental results show that the security of this algorithm is verified by analyzing the information entropy, image correlation of adjacent pixels and other indexes. At the same time, this algorithm passes the noise attack test and the occlusion attack test, so it can resist common attacks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Encryption systems"

1

Ahlström, Henrik, and Karl-Johan Skoglund. "Encryption in Delocalized Access Systems." Thesis, Linköping University, Department of Science and Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10528.

Full text
Abstract:
<p>The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems.</p><p>This report contains a literature study of the complications related to access systems and their functionality. Also a basic introduction to cryptography is included.</p><p>Several cryptographic algorithms were implemented using the public library LibTomCrypt and benchmarked on an ARM7-processor platform. The asymmetric coding schemes were ECC and RSA. The tested symmetric algorithms included AES, 3DES and Twofish among others. The benchmark considered both codesize and speed of the algorithms.</p><p>The two asymmetric algorithms, ECC and RSA, are possible to be used in an ARM7 based access system. Although, both technologies can be configured to finish the calculations within a reasonable time-frame of 10 Sec, ECC archives a higher security level for the same execution time. Therefore, an implementation of ECC would be preferable since it is faster and requires less resources. Some further suggestions of improvements to the implementation is discussed in the final chapters.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Denning, Daniel. "Encryption systems for FPGA computing." Thesis, University of Glasgow, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goodman, James R. (James Ross). "Low power scalable encryption for wireless systems." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/10646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.

Full text
Abstract:
In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. However, manually encrypting and decrypting data along with the key management is a burden for the regular user of a database. The need for removing this burden gave birth to Transparent Data Encryption (TDE).   TDE technology is widely available nowadays and a number of vendors have developed their own solutions for protecting data at rest in a transparent way to the end user. However, cryptographic operations are resource intensive and introduce an overhead to the computational operations. The burden of cryptographic operations has drawn the interest of both academia and the industry for a long time before TDE appeared on the horizon. Hence, a lot of research has been done to measure the performance impact of those operations.   Despite the extensive study for the performance of cryptographic algorithms, the performance of the TDE systems and the add-on computational burden for the introduced encryption has not yet been studied thoroughly. As a result, the current Thesis project tries to develop a theoretical benchmarking framework that evaluates the performance of Transparent Data Encryption systems. The study is conducted utilizing the Design Research methodology.   The developed benchmarking framework focuses on the basic performance metrics of TDE systems, Elapsed time, CPU time and Hard Disk memory consumption. These metrics are calculated for varying key lengths, encryption algorithms and table sizes.  The framework follows a five - step procedure that includes the creation of topology - lab environment, creation of databases and definition of scenarios, activation of TDE feature, sequencial execution of scenarios and analysis of the results. The developed framework is evaluated by applying it on real TDE systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Einicke, Garry A. "Random bit interleaving for trunk link encryption /." Title page, abstract and contents only, 1990. http://web4.library.adelaide.edu.au/theses/09EN/09ene35.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elkouny, Abdel-latif Ahmed Abdel-latif. "Real time secure communications using chaotic encryption systems." Thesis, University of Kent, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jeddi, Zahra. "A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems." Thesis, University of Louisiana at Lafayette, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3687692.

Full text
Abstract:
<p> Radio Frequency Identification, RFID, is a type of automatic identification system which has gained popularity in recent years for being fast and reliable in keeping track of individual objects. Due to limited available resources in RFID tags, providing privacy and security for RFID systems is one of the important challenges nowadays. In this dissertation, a lightweight symmetric encryption algorithm called RBS, Redundant Bit Security, is presented which is suitable for resource constrained applications like RFID systems. Confidentiality of the plaintext in this algorithm is achieved through inserting some redundant bits inside the plaintext bits where the location of redundant bits inside the ciphertext is the secret key shared between sender and receiver. Besides confidentiality, these redundant bits are calculated in such a way that they provide authentication and integrity as well. The security of the algorithm is analyzed against some well-known attacks such as known plaintext, known ciphertext, chosen plaintext, and differential attacks. Experimental and simulation results confirm that RBS implementation requires less power and area overhead compared to other known symmetric algorithms proposed for RFID systems, especially when the authentication is essential like in harsh environments. </p>
APA, Harvard, Vancouver, ISO, and other styles
8

Shehata, Ahmed Alaael-Din Rohiem. "Secure computer communications and databases using chaotic encryption systems." Thesis, University of Kent, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.324713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Jiantao. "Multimedia lightweight encryption via randomized entropy coding /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?ECED%202009%20ZHOU.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Encryption systems"

1

Edin, Muharemagic, and Socek Daniel, eds. Multimedia encryption and watermarking. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

International Business Machines Corporation. International Technical Support Organization, ed. Encryption facility for z/OS version 1.10. IBM, International Technical Support Organization, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

A, Peirce M., and Tewari Hitesh, eds. Electronic payment systems. Artech House, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1965-2004, Bartolini Franco, ed. Watermarking systems engineering: Enabling digital assets security and other applications. Marcel Dekker, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Encryption facility for z/OS V1.2 OpenPGP support. International Business Machines Corporation, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

O'Mahony, Donal. Electronic payment systems for e-commerce. 2nd ed. Artech House, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

McLoone, Máire. System-on-Chip Architectures and Implementations for Private-Key Data Encryption. Springer US, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Encryption systems"

1

Donovan, Peter, and John Mack. "Major Encryption Systems." In Code Breaking in the Pacific. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08278-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Ninghui. "Symmetric Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Ninghui. "Asymmetric Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Ninghui. "Homomorphic Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Ninghui. "Symmetric Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Ninghui. "Asymmetric Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Ninghui. "Homomorphic Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_98-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Encryption systems"

1

Teufl, Peter, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, and Thomas Zefferer. "Android encryption systems." In 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS). IEEE, 2014. http://dx.doi.org/10.1109/prisms.2014.6970599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mosa, E., Nagy W. Messiha, and O. Zahran. "Random encryption of speech signal." In Systems (ICCES). IEEE, 2009. http://dx.doi.org/10.1109/icces.2009.5383253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alomari, Mohammad Ahmed, Khairulmizam Samsudin, and Abdul Rahman Ramli. "A Study on Encryption Algorithms and Modes for Disk Encryption." In 2009 International Conference on Signal Processing Systems. IEEE, 2009. http://dx.doi.org/10.1109/icsps.2009.118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumari, K. Sudha, and C. Nagaraju. "DNA Encrypting rules with Chaotic Maps for Medical Image Encryption." In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Subbulakshmi, T., Suryansh Bhardwai, Prakhar Ranjan, and Kenneth Antony John. "Enhanced SPK Encryption Algorithm for File Encryption Using Java." In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2018. http://dx.doi.org/10.1109/iccons.2018.8662910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Naeem, Ensherah A., Mustafa M. Abd Elnaby, and Mohiy M. Hadhoud. "Chaotic image encryption in transform domains." In Systems (ICCES). IEEE, 2009. http://dx.doi.org/10.1109/icces.2009.5383309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Minqing, Xu An Wang, Xiaoyuan Yang, and Weiyi Cai. "Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bijlani, Harsh, Dikshant Gupta, and Mayank Lovanshi. "Audio Encryption Optimization." In 2018 8th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2018. http://dx.doi.org/10.1109/csnt.2018.8820275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zaw, Than Myo, Min Thant, and S. V. Bezzateev. "Database Security with AES Encryption, Elliptic Curve Encryption and Signature." In 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2019. http://dx.doi.org/10.1109/weconf.2019.8840125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Saif Ali, R. K. Aggarwal, and Shashidhar Kulkarni. "Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data." In 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). IEEE, 2019. http://dx.doi.org/10.1109/icaccs.2019.8728427.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Encryption systems"

1

Arnold, J., T. Ambrosi, and W. Geer. Security Dynamics Access Control Encryption System. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada221814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keller, S. S. Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) :. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography