Academic literature on the topic 'Encryption techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encryption techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encryption techniques"
Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Full textRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Full textThirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Full textLi, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.
Full textAnsari, Tasin Habib Ahmad* Dr. J. W. Bakal. "ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 11 (2016): 83–91. https://doi.org/10.5281/zenodo.164906.
Full textParenreng, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.
Full textSharma, Ramandeep, Richa Sharma, and Harmanjit Singh. "Classical Encryption Techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 84–90. http://dx.doi.org/10.24297/ijct.v3i1b.2745.
Full textVaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.
Full textYeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Full textLi, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.
Full textDissertations / Theses on the topic "Encryption techniques"
Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Full textDutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Full textKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Full textTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textJha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Full textWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textBrisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Full textGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Full textBooks on the topic "Encryption techniques"
Lian, Shiguo. Multimedia content encryption: Techniques and applications. Auerbach Publications, 2008.
Find full textHeld, Gilbert. Learn encryption techniques with BASIC and C++. Wordware Pub., 1999.
Find full textBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Find full textGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford Brookes University, 2003.
Find full textSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Wiley Pub., 2008.
Find full textShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Taylor & Francis, 2008.
Find full textS, Schmalz Mark, and Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. SPIE, 2004.
Find full textEUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Springer, 2000.
Find full textBook chapters on the topic "Encryption techniques"
Yi, Xun, Xuechao Yang, Xiaoning Liu, et al. "Homomorphic Encryption." In Privacy Enhancing Techniques. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-95140-4_2.
Full textAlbrecht, Martin, and Carlos Cid. "Algebraic Techniques in Differential Cryptanalysis." In Fast Software Encryption. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9_12.
Full textGautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Full textGautam, Tanvi, Aditya Thakkar, and Nitish Pathak. "Attribute-Based Encryption." In Emerging Security Algorithms and Techniques. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-11.
Full textGouget, Aline, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, and Chris Mitchell. "Analysis of the Bit-Search Generator and Sequence Compression Techniques." In Fast Software Encryption. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11502760_13.
Full textThanki, Rohit M. "Audio Watermarking with Encryption." In Advanced Techniques for Audio Watermarking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24186-5_5.
Full textDinur, Itai, Orr Dunkelman, Nathan Keller, and Adi Shamir. "Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64." In Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_20.
Full textLu, Rongxing. "Homomorphic Public Key Encryption Techniques." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32899-7_2.
Full textRajendiran, M., B. Syed Ibrahim, R. Pratheesh, and C. Nelson Kennnedy Babu. "Multilanguage Based SMS Encryption Techniques." In Advances in Intelligent Systems and Computing. Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_55.
Full textMishra, Prasanna Raghaw, Indivar Gupta, and Navneet Gaba. "Cryptanalysis of Multilanguage Encryption Techniques." In Mathematics and Computing 2013. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1952-1_2.
Full textConference papers on the topic "Encryption techniques"
Abughali, Heba A. M., and Utku Kose. "Image Encryption Techniques: A Survey." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847281.
Full textK, Megala, Jayadevi J, Keerthika K, Manikandan G, Vijay Sai R, and Srinivasan B. "Secure Medical Image Encryption Using Homomorphic Techniques." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690754.
Full textKhare, Shanu, Navjot Singh Talwandi, Payal Thakur, Rakesh Thakur, Bhavana Bansal, and Kalpana Singh. "Brain-Inspired Encryption Techniques for Medical Imaging." In 2024 IEEE Silchar Subsection Conference (SILCON). IEEE, 2024. https://doi.org/10.1109/silcon63976.2024.10910555.
Full textChidambaranathan, Senthilnathan, M. Santhanaraj, E. Ajitha, Syed Fiaz A. S, Suchithra B, and T. Kathirvel. "Automated Detection of Encryption Algorithms Using AI Techniques." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823274.
Full textGupta, Ambika, Suyel Namasudra, and Prabhat Kumar. "Securing the Cloud “Advanced Techniques in Data Encryption”." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983278.
Full textPatel, Advait, Hariharan Ragothaman, Milavkumar Shah, et al. "AI-Powered Data Encryption Techniques: Safeguarding Cloud Infrastructure." In 2025 IEEE Conference on Artificial Intelligence (CAI). IEEE, 2025. https://doi.org/10.1109/cai64502.2025.00153.
Full textMageshwaran, M. K., and P. Sri Ramya. "Data Protection in the Era of Big Data Advanced Encryption Standard VS Data Encryption Standard." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877503.
Full textGhosh, Shithan, Sanjukta Mondal, Arnab Laha, Bishakha Mondal, Atri Bandyopadhyay, and Prasun Chakraborty. "Enhancing E-commerce Recommendation Systems Through Advanced Encryption Techniques." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724864.
Full textTahami, Syed Zoubaid, Maria Ashraf, Anila Saghir, and Madiha Abbasi. "Performance Analysis of Popular Encryption Techniques for Mobile Applications." In 2024 Global Conference on Wireless and Optical Technologies (GCWOT). IEEE, 2024. https://doi.org/10.1109/gcwot63882.2024.10805643.
Full textShang, Jun, Hanwen Zhang, Weixiong Rao, and Yiguang Hong. "Linear Encryption Techniques for Counteracting Information-based Stealthy Attacks." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821578.
Full textReports on the topic "Encryption techniques"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textRannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, 2021. http://dx.doi.org/10.21248/gups.63413.
Full text