Literatura académica sobre el tema "Encryption"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Encryption".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Encryption"

1

Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption." Theoretical and Natural Science 2, no. 1 (2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.

Texto completo
Resumen
Encryption is an important factor during online communication. It is useful to protect users privacy and prevent eavesdroppers listening. RSA encryption and quantum encryption are two mainstream encryption methods applied nowadays. This paper focuses on the evaluation and comparison between these two encryptions. It adopts the basic theory of RSA encryption and quantum encryption and provides an analysis of the benefits and shortcomings of these encryptions. It can be concluded that RSA (a type of mathematical encryption) is more popular than quantum encryption (a kind of physical encryption),
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Pourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (2021): 341. http://dx.doi.org/10.3390/e23030341.

Texto completo
Resumen
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been suggested to improve secure image encryption schemes. Nowadays, chaotic methods have been found in diverse fields, such as the design of cryptosystems and image encryption. Chaotic methods-based digital image encryptions are a novel image encryption method. This technique uses random chaos sequences for encrypting images, and it is a highly-secured
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Artajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.

Texto completo
Resumen
The security of communication via e-mail is increasingly important in today's digital era, where cyber attacks are increasing. These threats require the development of effective solutions to protect the confidentiality and integrity of information in e-mail. This study presents the development of an e-mail messaging application that employs a hybrid cryptosystem combining Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms. The aim is to improve the security of e-mail communications by utilizing the strengths of both symmetric and asymmetric encryption methods. AES is
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Texto completo
Resumen
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Texto completo
Resumen
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption st
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.

Texto completo
Resumen
Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Huang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.

Texto completo
Resumen
This project explores digital cryptography through the cryptography security system of RSA encryption. It also explores digital signature encryption with a simple hashing mechanism. This project resulted in a program that encoded and decoded messages using RSA encryption, handled large numbers, and calculated encryptions in a viable amount of time.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Zhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Texto completo
Resumen
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is th
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Zhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.

Texto completo
Resumen
Image encryption technology has been applied in many fields and is becoming the main way of protecting the image information security. There are also many ways of image encryption. However, the existing encryption algorithms, in order to obtain a better effect of encryption, always need encrypting several times. There is not an effective method to decide the number of encryption times, generally determined by the human eyes. The paper proposes an image encryption algorithm based on chaos and simultaneously proposes a balanced pixel algorithm to determine the times of image encryption. Many sim
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Liu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 119–24. https://doi.org/10.54097/cm6eq023.

Texto completo
Resumen
This paper creates a new direction for the operation optimization of Simplified Message Block Cipher for 128-bit Data encryption (SM4) national cipher algorithm, which combines with AES algorithm to provide a simpler encryption method for SM4 algorithm. The AES algorithm is for the whole file system-based f encryption scheme, and the implementation concept is to encrypt the file and maintain data security by encrypting files to encrypt and maintain data security. The advantages of this encryption method are that they have few key numbers and are easy to manage. The disadvantage is that when a
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Encryption"

1

Yilmaz, Fatih Levent. "Video Encryption." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12604.

Texto completo
Resumen
Video Encryption is nearly the best method for blocking unwanted seizures and viewing of any transmitted video or information. There are several useful techniques that are available for encryping videos. However, one of the unique speciality for human eye is spotting the irregularity in videos due to weak video decoding or weak choice of video encryption hardware. Because of this situation, it is very important to select the right hardware or else our video transmissions may not be secured or our decoded video may be un-watchable. Every technique has advantages and disadvantages over other tec
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Akdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.

Texto completo
Resumen
In this study, a new method is proposed to protect JPEG still images through encryption by employing integer-to-integer transforms and frequency domain scrambling in DCT channels. Different from existing methods in the literature, the encrypted image can be further compressed, i.e. transcoded, after the encryption. The method provides selective encryption/security level with the adjustment of its parameters. The encryption method is tested with various images and compared with the methods in the literature in terms of scrambling performance, bandwidth expansion, key size and security. Furtherm
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.

Texto completo
Resumen
Die heutige Informationsgesellschaft hat die Formen des menschlichen Handelns in vielen Bereichen des taeglichen Lebens veraendert. Die Moeglichkeit, Informationen über das Internet auszutauschen, draengt konventionelle Kommunikationsformen immer mehr in den Hintergrund. Gerade in den Bereichen eBusiness und ePayment, welche aufgrund der zunehmenden Globalisierung unabdingbar sind, spielen dabei die Sicherheit und die Authentitaet der uebertragenen Daten eine wichtige Rolle. Meine Seminararbeit stellt den Data Encryption Standard (DES) in seiner Funktionsweise vor, diskutiert kritisch dessen S
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

St-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.

Texto completo
Resumen
To the field of cryptography, quantum mechanics is a game changer. The exploitation of quantum mechanical properties through the manipulation of quantum information, the information encoded in the state of quantum systems, would allow many protocols in use today to be broken as well as lead to the expansion of cryptography to new protocols. In this thesis, quantum encryption, i.e. encryption schemes for quantum data, is defined, along with several definitions of security, broadly divisible into semantic security and ciphertext indistinguishability, which are proven equivalent, in analogy to th
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Fauzi, Prastudy. "On Fully Homomorphic Encryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.

Texto completo
Resumen
Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and perform arbitrary operations on this data efficiently.The data remains encrypted throughout, but the operations can be done regardless, without having to know the decryption key.Such a scheme would be very advantageous, for example in ensuring the privacy of data that is sent to a third-party service.This is in contrast with schemes like Paillier where you can not perform a multiplication of encrypted data without decrypting the data first, or ElGamal where you can not perform an addition of encry
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Topsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.

Texto completo
Resumen
This thesis is about the theory behind and software development of TDE View. The application produces a graphical presentation containing graphical objects, such as charts and tables, which display real time data derived from online and currently available services in Swedbank. TDE View is a long term replacement of the previous solution, TDE System Monitor, the purpose of TDE View is to provide the ability to preview the aforementioned features online instead of local deployment. Moreover, the thesis will cover aspects regarding concepts and ideas in transferring data from different hosts in
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.

Texto completo
Resumen
Protecting video streams while incurring minimal impact on the compression performance is very important for practical video distribution. Selective encryption is one of the most promising techniques that can offer the required security while maintaining format compliance after encryption with no or little impact on the compression performance. Also, selective encryption techniques can be employed in video surveillance systems to alleviate concerns over privacy invasion by applying the encryption to specific regions of interest. This thesis presents advanced selective encryption techniques for
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

King, Kevin C. "Optimizing fully homomorphic encryption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.

Texto completo
Resumen
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 50-51).<br>Fully homomorphic encryption (FHE) presents the possibility of removing the need to trust cloud providers with plaintext data. We present two new FHE scheme variants of BGV'12, both of which remove the need for ke
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Banu, Pokhali Sayeda Roohi. "Satellite on-board encryption." Thesis, University of Surrey, 2007. http://epubs.surrey.ac.uk/774244/.

Texto completo
Resumen
In the light of latest intrusions into satellite data the demand to protect the sensitive and valuable data transmitted from satellites to ground has increased and hence the need to use encryption on-board. The Advanced Encryption Standard (AES), which is a very popular choice in terrestrial communications, is slowly emerging as the preferred option in the aerospace industry including satellites. Computing systems on-board satellites have limited power and computational resources as in terrestrial embedded systems. With these constraints in mind various implementations of the AES algorithm usi
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Anicama, Jorge. "Prime numbers and encryption." Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/95565.

Texto completo
Resumen
In this article we will deal with the prime numbers and its current use in encryption algorithms. Encryption algorithms make possible the exchange of sensible data in internet, such as bank transactions, email correspondence and other internet transactions where privacy is important.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Libros sobre el tema "Encryption"

1

Ahmad, Khairol Amali Bin, Khaleel Ahmad, and Uma N. Dulhare, eds. Functional Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wheeler, David. Block encryption. University of Cambridge Computer Laboratory, 1987.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ren, Kui, and Cong Wang. Searchable Encryption. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Koç, Çetin Kaya, Funda Özdemir, and Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Biryukov, Alex, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Canteaut, Anne, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Leander, Gregor, ed. Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Preneel, Bart, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Gollmann, Dieter, ed. Fast Software Encryption. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Encryption"

1

Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.

Texto completo
Resumen
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage. New schemes with more efficient search operations and reduced access and search pattern leakage that support novel settings, such as dynamic data sets and multiple users, have been proposed in the last few years. Especially with the emergence of cloud storage, encryptin
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Buchanan, W. J. "Encryption." In The Complete Handbook of the Internet. Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_35.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Carter, Peter A. "Encryption." In Pro SQL Server 2019 Administration. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5089-1_11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mustafa, Osama, and Robert P. Lockard. "Encryption." In Oracle Database Application Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0_1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Natarajan, Jay, Rudi Bruchez, Scott Shaw, and Michael Coles. "Encryption." In Pro T-SQL 2012 Programmer’s Guide. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4597-1_7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Spendolini, Scott. "Encryption." In Expert Oracle Application Express Security. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4732-6_14.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Cebollero, Miguel, Jay Natarajan, and Michael Coles. "Encryption." In Pro T-SQL Programmer's Guide. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0145-9_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Carter, Peter A. "Encryption." In Pro SQL Server Administration. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0710-9_10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Aitchison, Alastair, and Adam Machanic. "Encryption." In Expert SQL Server 2008 Development. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7212-0_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Buchmann, Johannes A. "Encryption." In Introduction to Cryptography. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4684-0496-8_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Encryption"

1

Zhao, Pengyang. "Server-Aided Keyword Search Encryption With Password-Hardened Encryption." In 2024 5th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC). IEEE, 2024. https://doi.org/10.1109/isceic63613.2024.10810145.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

J R, Goutham, and Chethan Venkatesh. "Secure Folder Encryption Using Homomorphic Encryption with Microsoft SEAL." In 2025 International Conference on Computing for Sustainability and Intelligent Future (COMP-SIF). IEEE, 2025. https://doi.org/10.1109/comp-sif65618.2025.10969942.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Yadav, Poonam, and Hukum Singh. "Optical Image Encryption and Classification Using Deep Neural Networks for IoT Applications." In Clinical and Translational Biophotonics. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/translational.2024.jd6a.14.

Texto completo
Resumen
In this paper, we present a novel method for encrypting images using double random phase encoding (DRPE) and securely storing them in the cloud without decryption. These encrypted images are classified using deep convolutional neural networks (CNN) in the cloud, eliminating the need for data decryption, and enhancing privacy. This approach has promising applications in fields like medicine and transportation, offering high-speed encryption and secure cloud storage while maintaining excellent image classification performance.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Gao, Haiying, and Chao Ma. "An Adaptively Secure NIPE Scheme based on DCR Assumption." In 9th International Conference on Artificial Intelligence and Applications (AIAPP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120914.

Texto completo
Resumen
Non-zero inner product encryption provides fine-grained access control to private data, but the existing non-zero inner product encryption schemes are mainly constructed based on the problem of bilinear groups and lattices without homomorphism. To meet the needs of users to control private data and cloud servers to directly process ciphertexts in a cloud computing environment, this paper designs a non-zero inner product encryption scheme based on the DCR assumption. Specifically, the access control policy is embedded in the ciphertext by a vector y, and the user attribute vector x is embedded
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Bhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.

Texto completo
Resumen
Within the field of cybersecurity, protecting visual data poses significant difficulties because of its extensive use and vulnerability to unwanted access. This article introduces the Enhanced Lightweight Visual Cryptosystem (ELVC), which is intended to strengthen cybersecurity by efficiently encrypting visual data. Using the Blake2 hash algorithm and advanced encryption techniques, the ELVC encrypts AC and DC coefficients, which are critical components in visual data compression. The encryption algorithm improves data security by calculating entropy, histograms, and PSNR values. Rigorous NIST
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

M. GHADI, Dua. "MODIFICATION OF ELGAMAL ELLIPTIC CURVE CRYPTOSYSTEM ALGORITHM." In VI.International Scientific Congress of Pure,Applied and Technological Sciences. Rimar Academy, 2022. http://dx.doi.org/10.47832/minarcongress6-8.

Texto completo
Resumen
The importance of data encryption has grown dramatically, especially in terms of personal data. The elliptic curve cryptosystem is the major solution for data security because it has become more prevalent. Security and privacy are required to ensure the data has recently generated much concern within the research community. This paper's objective is to obtain a complicated and secure ciphertext and make cryptanalysis difficult. In this paper, we modified the El-Gamal Elliptic Curve Cryptosystem (ECC) by producing new secret keys for encrypting data and embedding messages by using Discrete Loga
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Piper, F. "Encryption." In European Conference on Security and Detection - ECOS97 Incorporating the One Day Symposium on Technology Used for Combatting Fraud. IEE, 1997. http://dx.doi.org/10.1049/cp:19970422.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hashizume, Keiko, and Eduardo B. Fernandez. "Symmetric encryption and XML encryption patterns." In the 16th Conference. ACM Press, 2010. http://dx.doi.org/10.1145/1943226.1943243.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Cai, Xiantao, Weidong Li, and Fazhi He. "Partial Encryption Based Secure Sharing of CAD Models for Cloud-Based Design." In ASME 2014 International Manufacturing Science and Engineering Conference collocated with the JSME 2014 International Conference on Materials and Processing and the 42nd North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/msec2014-4079.

Texto completo
Resumen
Model security for collaborative product design in a networked environment (or called networked manufacture, grid manufacture, and cloud manufacture) is an important but also challenging research issue. In order to support collaborative product design in a secure and flexible means, a partial encryption based secure sharing method for Computer Aided Design (CAD) model is presented in this paper. Based on the above method, parts of a CAD model can be selected flexibly by users for encrypting according to different users’ requirements. The secret keys for the different parts of the CAD model can
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm." In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Encryption"

1

Karri, Ramesh, Ozgur Sinanoglu, and Jeyavihayan Rajendran. Logic Encryption. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada595228.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Raeburn, K. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3962.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Harkins, D., and W. Kumari, eds. Opportunistic Wireless Encryption. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8110.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Texto completo
Resumen
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Ts'o, T. Telnet Data Encryption Option. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2946.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Park, J., S. Lee, J. Kim, and J. Lee. The SEED Encryption Algorithm. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Lee, H. J., S. J. Lee, J. H. Yoon, D. H. Cheon, and J. I. Lee. The SEED Encryption Algorithm. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4269.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Johnson, Karen L. Semaphore Network Encryption Report. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada279294.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Coward, John R. Computational Complexity and Encryption. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada291910.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Jones, M., and J. Hildebrand. JSON Web Encryption (JWE). RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7516.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!