Journal articles on the topic 'Probabilistic data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 27 journal articles for your research on the topic 'Probabilistic data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.
Full textLeung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.
Full textAruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.
Full textZhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.
Full textKulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.
Full textLuna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.
Full textZhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.
Full textGandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.
Full textEt.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.
Full textJayapandian, N., and A. M. J. Md Zubair Rahman. "Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption." Cluster Computing 20, no. 2 (2017): 1561–73. http://dx.doi.org/10.1007/s10586-017-0809-4.
Full textWei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.
Full textSenthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.
Full textPrakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.
Full textDadheech, Pankaj, Abolfazl Mehbodniya, Shivam Tiwari, et al. "Zika Virus Prediction Using AI-Driven Technology and Hybrid Optimization Algorithm in Healthcare." Journal of Healthcare Engineering 2022 (January 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/2793850.
Full textYu, Yun William, and Griffin M. Weber. "Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation." Journal of Medical Internet Research 22, no. 11 (2020): e18735. http://dx.doi.org/10.2196/18735.
Full textKjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.
Full text"Identity Based Data Sharing and Profile Matching using Probabilistic Key in Cloud." International Journal of Recent Technology and Engineering 8, no. 6 (2020): 3076–80. http://dx.doi.org/10.35940/ijrte.f8434.038620.
Full text"A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 3880–83. http://dx.doi.org/10.35940/ijeat.c6389.029320.
Full textNagnath, Ingale Ashwini. "A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach." International Journal Of Engineering And Computer Science, January 30, 2017. http://dx.doi.org/10.18535/ijecs/v6i1.58.
Full text"Enhanced Security of Encrypted Text by KDMT: Key-Domain Maximization Technique." International Journal of Recent Technology and Engineering 8, no. 5 (2020): 1385–88. http://dx.doi.org/10.35940/ijrte.e6326.018520.
Full textJalasri, M., and L. Lakshmanan. "Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm." Cluster Computing, May 17, 2022. http://dx.doi.org/10.1007/s10586-022-03606-2.
Full textThurairasu, Lisa, and Nelson Chong. "Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data." International Journal of Population Data Science 1, no. 1 (2017). http://dx.doi.org/10.23889/ijpds.v1i1.307.
Full textAnwarbasha, H., S. Sasi Kumar, and D. Dhanasekaran. "An efficient and secure protocol for checking remote data integrity in multi-cloud environment." Scientific Reports 11, no. 1 (2021). http://dx.doi.org/10.1038/s41598-021-93073-3.
Full textDerler, David, Kai Gellert, Tibor Jager, Daniel Slamanig, and Christoph Striecks. "Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange." Journal of Cryptology 34, no. 2 (2021). http://dx.doi.org/10.1007/s00145-021-09374-3.
Full textLiu, Yiming, Qi Zeng, Yue Zhao, Kaijun Wu, and Yao Hao. "Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (2021). http://dx.doi.org/10.1186/s13638-021-02029-8.
Full textSchnell, Rainer, and Christian Borgs. "Proof of Concept for a Privacy Preserving National Mortality Register." International Journal of Population Data Science 3, no. 4 (2018). http://dx.doi.org/10.23889/ijpds.v3i4.732.
Full text