Academic literature on the topic 'Probabilistic data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Probabilistic data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Probabilistic data encryption"
Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Full textLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Full textAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Full textZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Full textLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Full textZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Full textGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Full textEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Full textDissertations / Theses on the topic "Probabilistic data encryption"
Lincoln, Laura Beth. "Symmetric private information retrieval via additive homomorphic probabilistic encryption /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2792.
Full textБейнер, Петр Сергеевич. "Информационно-измерительная система мониторинга температурного режима гидротехнических сооружений АЭС". Thesis, Национальный аэрокосмический университет им. Н. Е. Жуковского "Харьковский авиационный институт", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24781.
Full textБейнер, Петро Сергійович. "Інформаційно-вимірювальна система моніторингу температурного режиму гідротехнічних споруд АЕС". Thesis, НТУ "ХПІ", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/24773.
Full textBooks on the topic "Probabilistic data encryption"
Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer Berlin Heidelberg, 1999.
Find full textBook chapters on the topic "Probabilistic data encryption"
Adi Narayana Reddy, K., V. Madhu Viswanatham, and B. Vishnu Vardhan. "An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_33.
Full textKaduvu, Haripriya, V. Lavanya, and M. Saravanan. "Probabilistic Optimization of Incorporating Security Ciphers and Encryption of Data Storage in Cloud." In Artificial Intelligence Techniques for Advanced Computing Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5329-5_33.
Full text"Encryption Schemes for Anonymous Systems." In Anonymous Security Systems and Applications. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1649-3.ch004.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch009.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5351-0.ch052.
Full textKrishna, Addepalli V. N., and Balamurugan M. "Security Mechanisms in Cloud Computing-Based Big Data." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch032.
Full textN., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In IoT Architectures, Models, and Platforms for Smart City Applications. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1253-1.ch010.
Full textN., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In Research Anthology on Cross-Industry Challenges of Industry 4.0. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8548-1.ch094.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.
Full textConference papers on the topic "Probabilistic data encryption"
Singh, Binay Kumar, Abusha Tsegaye, and Jagat Singh. "Probabilistic data encryption using elliptic curve cryptography and Arnold transformation." In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2017. http://dx.doi.org/10.1109/i-smac.2017.8058259.
Full textSamanthula, Bharath K., Wei Jiang, and Sanjay Madria. "A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks." In 2013 14th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2013. http://dx.doi.org/10.1109/mdm.2013.18.
Full textYeh, Jyh-Haw. "A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds." In 2015 IEEE 12th Intl. Conf. on Ubiquitous Intelligence and Computing, 2015 IEEE 12th Intl. Conf. on Autonomic and Trusted Computing and 2015 IEEE 15th Intl. Conf. on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom). IEEE, 2015. http://dx.doi.org/10.1109/uic-atc-scalcom-cbdcom-iop.2015.130.
Full text