Journal articles on the topic 'Transparent Data Encryption (TDE)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Transparent Data Encryption (TDE).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vijay, Kumar Tiwari. "About Oracle TDE (Transparent Data Encryption)." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 1085. https://doi.org/10.5281/zenodo.3609978.
Full textResearcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.
Full textBeley, Olexander. "FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (2018): 12–15. http://dx.doi.org/10.5604/01.3001.0012.8013.
Full textSirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.
Full textResearcher. "COMPREHENSIVE REVIEW OF INNOVATIONS IN CLOUD INFRASTRUCTURE, AI-DRIVEN CYBERSECURITY, AND ADVANCED IPTV TECHNOLOGIES." Journal of Software Engineering (JSE) 2, no. 2 (2024): 33–42. https://doi.org/10.5281/zenodo.14055967.
Full textSibaram, Prasad Panda. "Data Security Mechanisms in Database Management." International Journal of Computer Application 15, no. 3 (2025): 1–14. https://doi.org/10.5281/zenodo.15469196.
Full textKaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.
Full textAlohali, Manal Abdullah, Mohammed Aljebreen, Fuad Al-Mutiri, et al. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments." Sustainability 15, no. 6 (2023): 5133. http://dx.doi.org/10.3390/su15065133.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.
Full textRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.
Full textMaurya, Arvind Kumar, Avinash Singh, Unnati Dubey, and Shivansh Pandey and Upendra Nath Tripathi. "Protection of Data Stored in Transparent Database System using Encryption." Journal of Computer and Mathematical Sciences 10, no. 1 (2019): 190–96. http://dx.doi.org/10.29055/jcms/992.
Full textJackson, Jennifer, Minmin Jiang, and David Oswald. "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 2 (2025): 268–92. https://doi.org/10.46586/tches.v2025.i2.268-292.
Full textNaz, Muqaddas, Fahad A. Al-zahrani, Rabiya Khalid, et al. "A Secure Data Sharing Platform Using Blockchain and Interplanetary File System." Sustainability 11, no. 24 (2019): 7054. http://dx.doi.org/10.3390/su11247054.
Full textHan, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.
Full textHuang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.
Full textMaharani, Herliana Wahyu. "Application of Blockchain Technology for Digital Transaction Security on Business Incubator Websites." Conference Series 2, no. 11 (2020): 8–14. http://dx.doi.org/10.34306/conferenceseries.v2i11.328.
Full textDliyanti, Aulia. "Creative Economy of College Student Gamification based on E-Commerce." Conference Series 2, no. 11 (2020): 22–30. http://dx.doi.org/10.34306/conferenceseries.v2i11.330.
Full textXu, Yong Kang, Zheng Jing Wan, Ji Lan Zhang, and Jia Ju Wu. "Research and Implementation of Relational Database Encryption Technology Based on Main Memory Database." Applied Mechanics and Materials 571-572 (June 2014): 591–99. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.591.
Full textMunish Saran,. "A Secure Framework based on Sensor-Cloud architecture for Healthcare data using enhanced Elliptic Curve Encryption." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 37–49. https://doi.org/10.52783/cana.v32.3836.
Full textBamigbade, Oluwatobi. "Balancing Encryption Laws and National Security: Challenges for Data and Energy Sector Collaboration across Borders." Journal of Engineering Research and Reports 27, no. 6 (2025): 193–213. https://doi.org/10.9734/jerr/2025/v27i61538.
Full textDidi, Rosiyadi, Indra Basuki Akbari, Iqbal Ramdhani Taufik, Susanto Heru, and Hasani Siregar Yusnan. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388–400. https://doi.org/10.11591/ijece.v13i4.pp4388-4400.
Full textRosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.
Full textGao, Lixia. "Enterprise internal audit data encryption based on blockchain technology." PLOS ONE 20, no. 1 (2025): e0315759. https://doi.org/10.1371/journal.pone.0315759.
Full textAl Jaoufi, Mohammed Ahmed Ahmed, Yun Liu, and Zhen Jiang Zhang. "A Safe and Transparent Sensor Network Data Aggregation (STDA) Program." Advanced Materials Research 1079-1080 (December 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.591.
Full textAhmed, Musa Midila, and Aishatu Musa Ahmed. "Citizens’ Data Protection in E-government System." International Journal of Innovative Computing 13, no. 2 (2023): 1–9. http://dx.doi.org/10.11113/ijic.v13n2.389.
Full textKeenan, Bernard. "State access to encrypted data in the United Kingdom: The ‘transparent’ approach." Common Law World Review 49, no. 3-4 (2019): 223–44. http://dx.doi.org/10.1177/1473779519892641.
Full textSiva, Krishna Jampani. "AI and Blockchain Integration for Enhanced Cloud Storage Security and Encryption." European Journal of Advances in Engineering and Technology 8, no. 3 (2021): 92–98. https://doi.org/10.5281/zenodo.14637332.
Full textKhashan, Osama A., Nour M. Khafajah, Waleed Alomoush, et al. "Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors." Cryptography 7, no. 1 (2023): 12. http://dx.doi.org/10.3390/cryptography7010012.
Full textCh. Jyothi, Gaddam Udaya Sri, Manya Madhuri, Beena Kumari, and P. Udhay Kiran. "SECUREFILECHAIN: A BIOMETRIC-DRIVEN AND CHACHA ENHANCED FRAMEWORK FOR PRIVACY-PRESERVING DATA SHARING IN CYBER-PHYSICAL-SOCIAL SYSTEMS." International Journal of Engineering Research and Science & Technology 21, no. 3 (1) (2025): 608–15. https://doi.org/10.62643/ijerst.v21.n3(1).pp608-615.
Full textIqbal, Ahmed, and Irfan Alam Fahim. "Integrity verification for an optimized cloud architecture." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 166–73. https://doi.org/10.12928/TELKOMNIKA.v18i1.14105.
Full textAmoruso, Edward L., Richard Leinecker, and Cliff C. Zou. "User Privacy Protection via Windows Registry Hooking and Runtime Encryption." Sensors 24, no. 16 (2024): 5106. http://dx.doi.org/10.3390/s24165106.
Full textPuchala, Dariusz, Kamil Stokfiszewski, and Mykhaylo Yatsymirskyy. "Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard." Entropy 23, no. 4 (2021): 421. http://dx.doi.org/10.3390/e23040421.
Full textBenaich, Rihab, Saida El Mendili, and Youssef Gahi. "Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records." HighTech and Innovation Journal 4, no. 3 (2023): 630–52. http://dx.doi.org/10.28991/hij-2023-04-03-012.
Full textElbarbary, Enas, Ghada Abdelhady, Hussam Elbehiery, and Abdelhalim Zekry. "Secured Transparent Computerized Voting System performance measurements." International Journal of Engineering & Technology 4, no. 2 (2015): 327. http://dx.doi.org/10.14419/ijet.v4i2.4441.
Full textLandge, Mr Sarang. "A Blockchain-Powered E-Voting System with SHA-256 Encryption." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32060.
Full textA, Mahesh Chandra. "Smart Contract-Based E-Commerce System for Transparent and Auto Bmated Transactions Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3123–31. https://doi.org/10.22214/ijraset.2025.68856.
Full textElsa Wulandari, Annastasya Nabila, and Purwono. "Smart Contracts for Data Sharing in Drug Development a Systematic Review of Security and Transparent Measurement." Journal of Advanced Health Informatics Research 2, no. 1 (2024): 24–37. https://doi.org/10.59247/jahir.v2i1.288.
Full textDemertzis, Konstantinos, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis, and Lazaros Iliadis. "A Secure and Privacy-Preserving Blockchain-Based XAI-Justice System." Information 14, no. 9 (2023): 477. http://dx.doi.org/10.3390/info14090477.
Full textMohanty, Dr Rajnikanth. "BlockShare – Blockchain Based Secure Data Sharing Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46157.
Full textRuth Ramya, K., D. N.V.Saikrishna, T. Sravya Nandini, and R. Tanmai Gayatri. "A Survey on Using Biometrics for Cloud Security." International Journal of Engineering & Technology 7, no. 2.32 (2018): 307. http://dx.doi.org/10.14419/ijet.v7i2.32.15701.
Full textAli, Aitizaz, Bander Ali Saleh Al-rimy, Faisal S. Alsubaei, Abdulwahab Ali Almazroi, and Abdulaleem Ali Almazroi. "HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications." Sensors 23, no. 15 (2023): 6762. http://dx.doi.org/10.3390/s23156762.
Full textLitvinov, V. S., A. A. Vlasov, and D. V. Teytelbaum. "Development of Software for Transparent Remote Access to Technological Parameters of Drilling and Data from a Downhole Telemetry System in Unstable Communication Conditions." Vestnik NSU. Series: Information Technologies 17, no. 2 (2019): 101–13. http://dx.doi.org/10.25205/1818-7900-2019-17-2-101-113.
Full textAwasare, Om R. "Advanced Cryptographic Technologies in Blockchain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51038.
Full textJamali, Mujeeb-ur-Rehman, Dr Najma Nawaz Channa, Aadil Jamali, Asad Ali Jamali, Mazher Ali, and Abdul Khalique Baloch. "Blockchain Technology Performance of Asymmetric Algorithms: An Empirical Study." VFAST Transactions on Software Engineering 11, no. 3 (2023): 10–24. http://dx.doi.org/10.21015/vtse.v11i3.1580.
Full textGarcia Valencia, Oscar A., Supawadee Suppadungsuk, Charat Thongprayoon, et al. "Ethical Implications of Chatbot Utilization in Nephrology." Journal of Personalized Medicine 13, no. 9 (2023): 1363. http://dx.doi.org/10.3390/jpm13091363.
Full textVittal Rao Baikadolla. "Balancing Innovation and Privacy: Addressing Surveillance Concerns in Healthcare AI Systems." Journal of Computer Science and Technology Studies 7, no. 7 (2025): 921–29. https://doi.org/10.32996/jcsts.2025.7.7.101.
Full textChananagari Prabhakar, Rohit Reddy. "Enhancing Data Security in Higher Education Administration: Strategies for Protecting Student Information and Institutional Integrity in Cloud-Based Systems." Journal of Artificial Intelligence & Cloud Computing 2, no. 3 (2023): 1–4. http://dx.doi.org/10.47363/jaicc/2023(2)e150.
Full textRamakrishnan, Mr R., B. Beula grace, and K. Shanmugapriya. "Civis ID with True Face: A Biometric Voting System for Secure and Transparent Elections." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02169.
Full textSathyananda Kumar Pamarthy. "Implementing Robust Data Privacy and Security in Modern ERP Systems: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2360–65. https://doi.org/10.32628/cseit251112258.
Full textSavchenko, Mykyta, Vitaliy Tsyganok, and Oleh Andriichuk. "Decision Support Systems' Security Model Based on Decentralized Data Platforms." Decision Support Systems' Security Model Based on Decentralized Data Platforms 2318 (June 7, 2018): 209–21. https://doi.org/10.5281/zenodo.13843777.
Full text