Contents
Academic literature on the topic 'Modified User Supplied Key based Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Modified User Supplied Key based Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Modified User Supplied Key based Encryption"
Surya, Pratap Singh* Upendra Nath Tripathi. "PRESERVING DATABASE CONFIDENTIALITY USING MODIFIED USER SUPPLIED KEY BASED ENCRYPTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 274–81. https://doi.org/10.5281/zenodo.192615.
Full textRathod, Amit, and Kajal Patel. "Internal Re-keying Based Modified AES." Indian Journal Of Science And Technology 18, no. 1 (2025): 85–94. https://doi.org/10.17485/ijst/v18i1.2012.
Full textAmit, Rathod, and Patel Kajal. "Internal Re-keying Based Modified AES." Indian Journal of Science and Technology 18, no. 1 (2025): 85–94. https://doi.org/10.17485/IJST/v18i1.2012.
Full textSurya, Pratap Singh* Manish Mishra Upendra Nath Tripathi. "PRESERVING DATABASE CONFIDENTIALITY USING USER KEY BASED ENCRYPTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 10 (2016): 33–41. https://doi.org/10.5281/zenodo.159209.
Full textLiu, Zhe, Fuqun Wang, Kefei Chen, and Fei Tang. "A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update." Security and Communication Networks 2020 (December 22, 2020): 1–11. http://dx.doi.org/10.1155/2020/8856592.
Full textWang, Lu. "A Method for Key Updating of IBE with Wildcards." Advanced Materials Research 765-767 (September 2013): 1003–6. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1003.
Full textPatel, Maitri, and Rajan Patel. "Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem." Emerging Science Journal 5, no. 1 (2021): 77–84. http://dx.doi.org/10.28991/esj-2021-01259.
Full textAdlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.
Full textAggarwal, Mayank, Anju Malik, and Mani Madhukar. "Effective Cryptographic Renewal Method with Rivest-Shamir-Adleman, Modified Artificial Bee Colony Optimization to Achieve Secure Cloud Storage and Computation in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2699–705. http://dx.doi.org/10.1166/jctn.2020.9108.
Full textPriya Remamany, Krishna, K. Maheswari, C. Ramesh Babu Durai, et al. "A Localized Bloom Filter-Based CP-ABE in Smart Healthcare." Applied Sciences 12, no. 24 (2022): 12720. http://dx.doi.org/10.3390/app122412720.
Full text