Journal articles on the topic 'Probabilistic data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Probabilistic data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
N., V. V. Satyanarayana, M. S. V. Ravi Kumar J., Babu Reddy M., Leelavathi N., and Sujatha B. "A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3880–83. https://doi.org/10.35940/ijeat.C6389.029320.
Full textMazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Full textKorchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.
Full textAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Full textLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Full textZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Full textBystrevskii, Sergey A., Aleksei E. Borshevnikov, and Yuri V. Dobrzhinsky. "Data verification protocol for a confidential computing scheme with homomorphic encryption." Proceedings of Tomsk State University of Control Systems and Radioelectronics 27, no. 2 (2024): 31–36. http://dx.doi.org/10.21293/1818-0442-2024-27-2-31-36.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Full textDe, Mello Flavio, and José A. M. Xexéo. "Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence." JUCS - Journal of Universal Computer Science 24, no. (1) (2018): 25–42. https://doi.org/10.3217/jucs-024-01-0025.
Full textZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Full textLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Full textRanadheer Reddy, Vallem. "SECURE DATA TRANSFER AND DETECTION FROM COUNTING BLOOM FILTER IN CLOUD COMPUTING." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03096.
Full textGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Full textWei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.
Full textEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Full textAhmad, Fawad, Reshail Khan, and Armel Asongu Nkembi. "Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM." Inventions 10, no. 4 (2025): 56. https://doi.org/10.3390/inventions10040056.
Full textSenthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Full textJayapandian, N., and A. M. J. Md Zubair Rahman. "Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption." Cluster Computing 20, no. 2 (2017): 1561–73. http://dx.doi.org/10.1007/s10586-017-0809-4.
Full textFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Full textLi, Jun, Chenyang Zhang, Jianyi Zhang, and Yanhua Shao. "Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning." Future Internet 16, no. 4 (2024): 113. http://dx.doi.org/10.3390/fi16040113.
Full textTrivedi, Devharsh, Aymen Boudguiga, Nesrine Kaaniche, and Nikos Triandopoulos. "SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation." Cryptography 7, no. 4 (2023): 52. http://dx.doi.org/10.3390/cryptography7040052.
Full textPrasanna Kumar M, Et al. "A Lightweight Security Model using Delta Probabilistic Hashing Technique for Secured Data Transmission in IoT Systems." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 2097–107. http://dx.doi.org/10.17762/ijritcc.v11i10.8895.
Full textPrakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.
Full textDadheech, Pankaj, Abolfazl Mehbodniya, Shivam Tiwari, et al. "Zika Virus Prediction Using AI-Driven Technology and Hybrid Optimization Algorithm in Healthcare." Journal of Healthcare Engineering 2022 (January 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/2793850.
Full textGu, Zhen, Guoyin Zhang, and Chen Yang. "Horizontally Partitioned Data Publication with Differential Privacy." Security and Communication Networks 2022 (July 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/7963004.
Full textRocha, Bruno Santos, Jose Antonio Moreira Xexeo, and Renato Hidaka Torres. "Post-quantum cryptographic algorithm identification using machine learning." Journal of Information Security and Cryptography (Enigma) 9, no. 1 (2022): 1–8. http://dx.doi.org/10.17648/jisc.v9i1.81.
Full textSharov, Vladyslav, and Olena Nikulina. "LAYERED DEFENSE IN COMMUNICATION SYSTEMS: JOINT USE OF VPN PROTOCOLS AND LINEAR BLOCK CODES." Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, no. 1 (13) (July 11, 2025): 112–16. https://doi.org/10.20998/2079-0023.2025.01.17.
Full textPinnapati, Surekha, and Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680. http://dx.doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.
Full textSurekha, Pinnapati Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680–87. https://doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.
Full textSolunke, Hiralal Bhaskar, Pawan Bhaladhare, and Amol Potgantwar. "Design of an iterative method for privacy : Preserving blockchain networks integrating dynamic routing with deep Q-networks and homomorphic encryption-based secure routing." Journal of Information and Optimization Sciences 46, no. 4-A (2025): 1081–90. https://doi.org/10.47974/jios-1893.
Full textKhadidos, Adil O., S. Shitharth, Alaa O. Khadidos, K. Sangeetha, and Khaled H. Alyoubi. "Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism." Journal of Sensors 2022 (June 2, 2022): 1–17. http://dx.doi.org/10.1155/2022/8457116.
Full textNeamah Abbas, Farah, Mohanad Ridha Ghanim, and Rafal Naser Saleh. "Subject Review:AI-Driven Security in Quantum Machine Learning:Vulnerabilities,Threats, and Defenses." International Journal of Engineering Research and Advanced Technology 11, no. 04 (2025): 01–22. https://doi.org/10.31695/ijerat.2025.4.1.
Full textSu, Man Nam1 and Tae Ho Cho2. "A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS." A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS 02, dec (2014): 01–17. https://doi.org/10.5121/ieij.2014.2402.
Full textDhivya. R, B. Srinivasan. "Probabilistic Deming Deep Recursive Network and Schmidt-Samoa Cryptosystem for Cyber Attack Detection and Secure Transmission in Wireless Networks." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 1427–50. https://doi.org/10.52783/cana.v32.4167.
Full textMaheshbhai, Kansara. "Advancements in Cloud Database Migration: Current Innovations and Future Prospects for Scalable and Secure Transitions." Sage Science Review of Applied Machine Learning 7, no. 1 (2024): 127–43. https://doi.org/10.5281/zenodo.15033980.
Full textYu, Yun William, and Griffin M. Weber. "Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation." Journal of Medical Internet Research 22, no. 11 (2020): e18735. http://dx.doi.org/10.2196/18735.
Full textSayeed, Aqsa, Chaman Verma, Neerendra Kumar, Neha Koul, and Zoltán Illés. "Approaches and Challenges in Internet of Robotic Things." Future Internet 14, no. 9 (2022): 265. http://dx.doi.org/10.3390/fi14090265.
Full textKjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.
Full text"Identity Based Data Sharing and Profile Matching using Probabilistic Key in Cloud." International Journal of Recent Technology and Engineering 8, no. 6 (2020): 3076–80. http://dx.doi.org/10.35940/ijrte.f8434.038620.
Full text"A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 3880–83. http://dx.doi.org/10.35940/ijeat.c6389.029320.
Full textNagnath, Ingale Ashwini. "A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach." International Journal Of Engineering And Computer Science, January 30, 2017. http://dx.doi.org/10.18535/ijecs/v6i1.58.
Full textNaga Srinivasu, Parvathaneni, Ranjit Panigrahi, Ashish Singh, and Akash Kumar Bhoi. "Probabilistic Buckshot Driven Cluster Head Identification and Accumulative Data Encryption in WSN." Journal of Circuits, Systems and Computers, June 17, 2022. http://dx.doi.org/10.1142/s0218126622503030.
Full text"Enhanced Security of Encrypted Text by KDMT: Key-Domain Maximization Technique." International Journal of Recent Technology and Engineering 8, no. 5 (2020): 1385–88. http://dx.doi.org/10.35940/ijrte.e6326.018520.
Full textM. Swetha and G. Appa Rao. "Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things Security." International Journal of Computational and Experimental Science and Engineering 10, no. 4 (2024). https://doi.org/10.22399/ijcesen.625.
Full textAndreou, Andreas, Constandinos X. Mavromoustakis, George Mastorakis, et al. "Towards an optimized security approach to IoT devices with confidential healthcare data exchange." Multimedia Tools and Applications 80 (March 26, 2021). https://doi.org/10.1007/s11042-021-10827-x.
Full textJalasri, M., and L. Lakshmanan. "Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm." Cluster Computing, May 17, 2022. http://dx.doi.org/10.1007/s10586-022-03606-2.
Full textThurairasu, Lisa, and Nelson Chong. "Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data." International Journal of Population Data Science 1, no. 1 (2017). http://dx.doi.org/10.23889/ijpds.v1i1.307.
Full textMoses, Oseghale Ikeakhe. "QUANTUM AI FOR NEXT-GENERATION SECURITY IN FINTECH, CYBERSECURITY, AND HEALTHCARE." International Journal of Engineering Technology Research & Management (ijetrm) 07, no. 08 (2023). https://doi.org/10.5281/zenodo.14837113.
Full textAnwarbasha, H., S. Sasi Kumar, and D. Dhanasekaran. "An efficient and secure protocol for checking remote data integrity in multi-cloud environment." Scientific Reports 11, no. 1 (2021). http://dx.doi.org/10.1038/s41598-021-93073-3.
Full text