Literatura académica sobre el tema "Encryption"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Encryption".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Encryption"
Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption." Theoretical and Natural Science 2, no. 1 (2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.
Texto completoPourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (2021): 341. http://dx.doi.org/10.3390/e23030341.
Texto completoArtajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.
Texto completoThabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.
Texto completoEt. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.
Texto completoAlawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.
Texto completoHuang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.
Texto completoZhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.
Texto completoZhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.
Texto completoLiu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.
Texto completoTesis sobre el tema "Encryption"
Yilmaz, Fatih Levent. "Video Encryption." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12604.
Texto completoAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Texto completoMeissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Texto completoSt-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Texto completoFauzi, Prastudy. "On Fully Homomorphic Encryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.
Texto completoTopsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.
Texto completoWang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Texto completoKing, Kevin C. "Optimizing fully homomorphic encryption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.
Texto completoBanu, Pokhali Sayeda Roohi. "Satellite on-board encryption." Thesis, University of Surrey, 2007. http://epubs.surrey.ac.uk/774244/.
Texto completoAnicama, Jorge. "Prime numbers and encryption." Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/95565.
Texto completoLibros sobre el tema "Encryption"
Ahmad, Khairol Amali Bin, Khaleel Ahmad, and Uma N. Dulhare, eds. Functional Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.
Texto completoWheeler, David. Block encryption. University of Cambridge Computer Laboratory, 1987.
Buscar texto completoRen, Kui, and Cong Wang. Searchable Encryption. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.
Texto completoKoç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.
Texto completoBiryukov, Alex, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.
Texto completoCanteaut, Anne, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.
Texto completoLeander, Gregor, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.
Texto completoPreneel, Bart, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.
Texto completoGollmann, Dieter, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.
Texto completoChatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Texto completoCapítulos de libros sobre el tema "Encryption"
Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.
Texto completoBuchanan, W. J. "Encryption." In The Complete Handbook of the Internet. Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_35.
Texto completoCarter, Peter A. "Encryption." In Pro SQL Server 2019 Administration. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5089-1_11.
Texto completoMustafa, Osama, and Robert P. Lockard. "Encryption." In Oracle Database Application Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0_1.
Texto completoNatarajan, Jay, Rudi Bruchez, Scott Shaw, and Michael Coles. "Encryption." In Pro T-SQL 2012 Programmer’s Guide. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4597-1_7.
Texto completoSpendolini, Scott. "Encryption." In Expert Oracle Application Express Security. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4732-6_14.
Texto completoCebollero, Miguel, Jay Natarajan, and Michael Coles. "Encryption." In Pro T-SQL Programmer's Guide. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0145-9_8.
Texto completoCarter, Peter A. "Encryption." In Pro SQL Server Administration. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0710-9_10.
Texto completoAitchison, Alastair, and Adam Machanic. "Encryption." In Expert SQL Server 2008 Development. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7212-0_6.
Texto completoBuchmann, Johannes A. "Encryption." In Introduction to Cryptography. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4684-0496-8_3.
Texto completoActas de conferencias sobre el tema "Encryption"
Zhao, Pengyang. "Server-Aided Keyword Search Encryption With Password-Hardened Encryption." In 2024 5th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC). IEEE, 2024. https://doi.org/10.1109/isceic63613.2024.10810145.
Texto completoJ R, Goutham, and Chethan Venkatesh. "Secure Folder Encryption Using Homomorphic Encryption with Microsoft SEAL." In 2025 International Conference on Computing for Sustainability and Intelligent Future (COMP-SIF). IEEE, 2025. https://doi.org/10.1109/comp-sif65618.2025.10969942.
Texto completoYadav, Poonam, and Hukum Singh. "Optical Image Encryption and Classification Using Deep Neural Networks for IoT Applications." In Clinical and Translational Biophotonics. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/translational.2024.jd6a.14.
Texto completoGao, Haiying, and Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption." In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.
Texto completoBhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.
Texto completoM. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.
Texto completoPiper, F. "Encryption." In European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud. IEE, 1997. http://dx.doi.org/10.1049/cp:19970422.
Texto completoHashizume, Keiko, and Eduardo B. Fernandez. "Symmetric encryption and XML encryption patterns." In the 16th Conference. ACM Press, 2010. http://dx.doi.org/10.1145/1943226.1943243.
Texto completoCai, Xiantao, Weidong Li, and Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.
Texto completoWang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm." In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.
Texto completoInformes sobre el tema "Encryption"
Karri, Ramesh, Ozgur Sinanoglu, and Jeyavihayan Rajendran. Logic Encryption. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada595228.
Texto completoRaeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3962.
Texto completoHarkins, D., and W. Kumari, eds. Opportunistic Wireless Encryption. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8110.
Texto completoLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Texto completoTs'o, T. Telnet Data Encryption Option. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2946.
Texto completoPark, J., S. Lee, J. Kim, and J. Lee. The SEED Encryption Algorithm. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4009.
Texto completoLee, H. J., S. J. Lee, J. H. Yoon, D. H. Cheon, and J. I. Lee. The SEED Encryption Algorithm. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4269.
Texto completoJohnson, Karen L. Semaphore Network Encryption Report. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada279294.
Texto completoCoward, John R. Computational Complexity and Encryption. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada291910.
Texto completoJones, M., and J. Hildebrand. JSON Web Encryption (JWE). RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7516.
Texto completo