Artykuły w czasopismach na temat „Encrypted”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Encrypted”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Sonawane, Supriya S., and N. M. Shahane. "Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 873–78. https://doi.org/10.5281/zenodo.14742667.
Pełny tekst źródłaHaggag, Ayman, Mohamed Ghoneim, Jianming Lu, and Takashi Yahagi. "Access Control and Scalable Encryption Using a Stream Cipher for JPEG 2000 Encoded Images." Journal of Advanced Computational Intelligence and Intelligent Informatics 11, no. 7 (2007): 728–34. http://dx.doi.org/10.20965/jaciii.2007.p0728.
Pełny tekst źródłaHamano, Genki, Shoko Imaizumi, and Hitoshi Kiya. "Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images." Sensors 23, no. 7 (2023): 3400. http://dx.doi.org/10.3390/s23073400.
Pełny tekst źródłaHussien, Nadia, Nadia Mahmood Hussien, Saba Abdulbaqi Salman, and Mohammad Aljanabi. "Secure Federated Learning with a Homomorphic Encryption Model." International Journal Papier Advance and Scientific Review 4, no. 3 (2023): 1–7. http://dx.doi.org/10.47667/ijpasr.v4i3.235.
Pełny tekst źródłaLuu Hong Dung, Nguyen Vinh Thai, Nguyen Kim Thanh, and Pham Van Hiep. "A method for constructing public - key block cipher schemes based on discrete logarithm problem." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 15–26. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.15-26.
Pełny tekst źródłaNaik, Mr Shiva Kumar R., Kshitij Yadav, Hari Om yadav, Niha C. Gowda, and Mounika. "Data Recovery from Encrypted Image and Recovering Image." International Journal of Engineering and Advanced Technology 8, no. 5s (2019): 76–79. http://dx.doi.org/10.35940/ijeat.e1016.0585s19.
Pełny tekst źródłaCao, Fang, Jiayi Sun, Xiangyang Luo, Chuan Qin, and Ching-Chun Chang. "Privacy-preserving inpainting for outsourced image." International Journal of Distributed Sensor Networks 17, no. 11 (2021): 155014772110590. http://dx.doi.org/10.1177/15501477211059092.
Pełny tekst źródłaJena, Riyanka, Priyanka Singh, and Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization." Journal of Imaging 9, no. 9 (2023): 172. http://dx.doi.org/10.3390/jimaging9090172.
Pełny tekst źródłaHusain, Saba Mohammed. "New Encrypted Steganography Approach." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 2 (2017): 36–46. http://dx.doi.org/10.29196/jub.v26i2.472.
Pełny tekst źródłaPerillo, Angelo Massimo, Giuseppe Persiano, and Alberto Trombetta. "Secure Selections on Encrypted Multi-writer Streams." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–33. http://dx.doi.org/10.1145/3485470.
Pełny tekst źródłaCao, Wenjun, Junhong Liu, Guifan He, Zhengji Ma, and Xinyi Jiang. "Hybrid Encrypted Website based on Springboot." Frontiers in Humanities and Social Sciences 2, no. 12 (2022): 157–64. http://dx.doi.org/10.54691/fhss.v2i12.3216.
Pełny tekst źródłaChang, Ya-Fen, and Wei-Liang Tai. "Separable Reversible Watermarking in Encrypted Images for Privacy Preservation." Symmetry 14, no. 7 (2022): 1336. http://dx.doi.org/10.3390/sym14071336.
Pełny tekst źródłaLuu Hong Dung. "A method for constructing public-key block cipher schemes based on elliptic curves." Journal of Military Science and Technology, CSCE6 (December 30, 2022): 114–21. http://dx.doi.org/10.54939/1859-1043.j.mst.csce6.2022.114-121.
Pełny tekst źródłaKhan, Ahmad Neyaz, Ming Yu Fan, Muhammad Irshad Nazeer, Raheel Ahmed Memon, Asad Malik, and Mohammed Aslam Husain. "An Efficient Separable Reversible Data Hiding Using Paillier Cryptosystem for Preserving Privacy in Cloud Domain." Electronics 8, no. 6 (2019): 682. http://dx.doi.org/10.3390/electronics8060682.
Pełny tekst źródłaPradeep, Musham, and D. Srilatha. "Implementation of Detachable Reversible Data Hiding in Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 6 (2013): 2663–67. http://dx.doi.org/10.24297/ijct.v11i6.3041.
Pełny tekst źródłaRaniah, Ali Mustafa, Abdulbaqi Maryoosh Amal, Nadir George Dena, and Rasheed Humood Waleed. "Iris images encryption based on QR code and chaotic map." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 289–300. https://doi.org/10.12928/TELKOMNIKA.v18i1.13293.
Pełny tekst źródłaVarghese, Biby Bino, and Rosna P. Haroon. "Reversible Encrypted Data Hiding In Encrypted Video." IOSR Journal of Computer Engineering 16, no. 1 (2014): 71–82. http://dx.doi.org/10.9790/0661-16157182.
Pełny tekst źródłaAsthana, Rajesh, and Neelam Verma. "Classification of Encrypted Text and Encrypted Speech." Defence Science Journal 60, no. 4 (2010): 420–22. http://dx.doi.org/10.14429/dsj.60.497.
Pełny tekst źródłaReza Saputra and Yuli Asriningtias. "Notary Deed Security Application Using RC4 Method on Android-Based." Journal of Engineering, Electrical and Informatics 3, no. 3 (2023): 19–33. http://dx.doi.org/10.55606/jeei.v3i3.2252.
Pełny tekst źródłaAbdul Majeed, Ghassan, Alaa Kadhim, and Rasha Subhi Ali. "Retrieving Encrypted Query from Encrypted Database Depending on Symmetric Encrypted Cipher System Method." Diyala Journal For Pure Science 13, no. 1 (2017): 183–207. http://dx.doi.org/10.24237/djps.1301.103c.
Pełny tekst źródłaLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence." Mathematical Problems in Engineering 2022 (August 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Pełny tekst źródłaShvetha, A., S. Rathnamala, and M. V. Meenumathi. "Visual Secret Sharing Scheme Using Encrypting Multiple Images." Perspectives in Communication, Embedded-systems and Signal-processing - PiCES 5, no. 1 (2021): 6–10. https://doi.org/10.5281/zenodo.4739451.
Pełny tekst źródłaBuchanan, William J., and Hisham Ali. "Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption." Cryptography 9, no. 2 (2025): 33. https://doi.org/10.3390/cryptography9020033.
Pełny tekst źródłaLi, Xi-Yan, Xia-Bing Zhou, Qing-Lei Zhou, Shi-Jing Han, and Zheng Liu. "High-Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing." Complexity 2020 (October 22, 2020): 1–12. http://dx.doi.org/10.1155/2020/6989452.
Pełny tekst źródłaLiu, Wei, K. Chau, W. Lam, and Zhen Zhang. "Continuously Variable-Frequency Energy-Encrypted Wireless Power Transfer." Energies 12, no. 7 (2019): 1286. http://dx.doi.org/10.3390/en12071286.
Pełny tekst źródłaPerez, Ronal A., Juan M. Vilardy, Elisabet Pérez-Cabré, María S. Millán, and Cesar O. Torres. "Nonlinear Encryption for Multiple Images Based on a Joint Transform Correlator and the Gyrator Transform." Sensors 23, no. 3 (2023): 1679. http://dx.doi.org/10.3390/s23031679.
Pełny tekst źródłaD, Narmatha, Jenifa W, Merlin Moses M, and Prem Kumar J. "Text File Encryption and Decryption by FFT and IFFT Algorithm Using Lab view." Journal of Communication Engineering and Its Innovations 5, no. 3 (2019): 8–15. https://doi.org/10.5281/zenodo.3525834.
Pełny tekst źródłaWang, Tao, Bo Yang, Guoyong Qiu, et al. "An Approach Enabling Various Queries on Encrypted Industrial Data Stream." Security and Communication Networks 2019 (July 3, 2019): 1–12. http://dx.doi.org/10.1155/2019/6293970.
Pełny tekst źródłaAbusham, Eimad, Basil Ibrahim, Kashif Zia, and Muhammad Rehman. "Facial Image Encryption for Secure Face Recognition System." Electronics 12, no. 3 (2023): 774. http://dx.doi.org/10.3390/electronics12030774.
Pełny tekst źródłaLIAN, SHIGUO, XI CHEN, and DENGPAN YE. "SECURE FRACTAL IMAGE CODING BASED ON FRACTAL PARAMETER ENCRYPTION." Fractals 17, no. 02 (2009): 149–60. http://dx.doi.org/10.1142/s0218348x09004405.
Pełny tekst źródłaKamara, Seny. "Encrypted Search." XRDS: Crossroads, The ACM Magazine for Students 21, no. 3 (2015): 30–34. http://dx.doi.org/10.1145/2730908.
Pełny tekst źródłaMartin, Antoinette Deborah, and Inkyu Moon. "Privacy-Preserving Image Captioning with Partial Encryption and Deep Learning." Mathematics 13, no. 4 (2025): 554. https://doi.org/10.3390/math13040554.
Pełny tekst źródłaJang, Young-Dal, and Ji-Hong Kim. "A Comparison of the Query Execution Algorithms in Secure Database System." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (2016): 337. http://dx.doi.org/10.11591/ijece.v6i1.9335.
Pełny tekst źródłaJang, Young-Dal, and Ji-Hong Kim. "A Comparison of the Query Execution Algorithms in Secure Database System." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (2016): 337. http://dx.doi.org/10.11591/ijece.v6i1.pp337-343.
Pełny tekst źródłaPan, Jingshan, Tongtong Sui, Wen Liu, Jizhi Wang, Lingrui Kong, and Yue Zhao. "Secure Control Using Homomorphic Encryption and Efficiency Analysis." Security and Communication Networks 2023 (April 14, 2023): 1–12. http://dx.doi.org/10.1155/2023/6473497.
Pełny tekst źródłaAgarwal, Namita, and Pradeep Kumar Singh. "Robust and Secure Watermarking for Propagation of Digital Multimedia by Paillier Homomorphic Cryptosystem With Arnold Transformation." International Journal of E-Health and Medical Communications 12, no. 4 (2021): 17–31. http://dx.doi.org/10.4018/ijehmc.20210701.oa2.
Pełny tekst źródłaAlsalem, Hussain, Faisal Alotaibi, Mohsen Bamardouf, et al. "Laboratory Access Implementing QR Code Authentication Using OTP." International Journal on Cybernetics & Informatics 12, no. 5 (2023): 121–41. http://dx.doi.org/10.5121/ijci.2023.120511.
Pełny tekst źródłaNita, Stefania Loredana. "Secure Document Search in Cloud Computing using MapReduce." Scientific Bulletin of Naval Academy XXIII, no. 1 (2020): 231–35. http://dx.doi.org/10.21279/1454-864x-20-i1-031.
Pełny tekst źródłaYao, Yexia, Xuemei Xu, and Zhaohui Jiang. "A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms." Applied Sciences 15, no. 2 (2025): 913. https://doi.org/10.3390/app15020913.
Pełny tekst źródłaZhang, Xiaoqiang, and Xuesong Wang. "Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard." Applied Sciences 8, no. 9 (2018): 1540. http://dx.doi.org/10.3390/app8091540.
Pełny tekst źródłaGalih Agustian Perdana, Carudin, and Rini Mayasari. "Implementasi Algoritma Kriptografi Playfair Cipher untuk Mengamankan Data Aset." Jurnal Informatika Polinema 7, no. 2 (2021): 109–14. http://dx.doi.org/10.33795/jip.v7i2.394.
Pełny tekst źródłaDavid, Shibin, and G. Jaspher W. Kathrine. "Digital Signature Algorithm for M-Payment Applications Using Arithmetic Encoding and Factorization Algorithm." Journal of Cases on Information Technology 23, no. 3 (2021): 11–26. http://dx.doi.org/10.4018/jcit.20210701.oa2.
Pełny tekst źródłaJebaseeli*, K. Ketzial, and Dr V. G. Rani. "Schematizing Insured Healthcare Dossiers in Cloud using Blockading Maneuver Sequence Amplification (BMSA)." International Journal of Innovative Technology and Exploring Engineering 9, no. 2 (2019): 252–58. http://dx.doi.org/10.35940/ijitee.b61420.129219.
Pełny tekst źródłaXia, Zhihua, Qiuju Ji, Qi Gu, Chengsheng Yuan, and Fengjun Xiao. "A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words." ACM Transactions on Multimedia Computing, Communications, and Applications 18, no. 3 (2022): 1–18. http://dx.doi.org/10.1145/3492705.
Pełny tekst źródłaWamser, Markus Stefan, Stefan Rass, and Peter Schartner. "Oblivious Lookup-Tables." Tatra Mountains Mathematical Publications 67, no. 1 (2016): 191–203. http://dx.doi.org/10.1515/tmmp-2016-0039.
Pełny tekst źródłaAtito, Ahmed, A. Khalifa, and S. Z. Rida. "DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques." Journal of Communications and Computer Engineering 2, no. 3 (2011): 44. http://dx.doi.org/10.20454/jcce.2012.242.
Pełny tekst źródłaDai, Hua, Hui Ren, Zhiye Chen, Geng Yang, and Xun Yi. "Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds." Security and Communication Networks 2018 (September 4, 2018): 1–10. http://dx.doi.org/10.1155/2018/2373545.
Pełny tekst źródłaDarari, Radifan, Edi Winarko, and Auli Damayanti. "Encryption and Decryption Application on Images with Hybrid Algorithm Vigenere and RSA." Contemporary Mathematics and Applications (ConMathA) 2, no. 2 (2020): 109. http://dx.doi.org/10.20473/conmatha.v2i2.23855.
Pełny tekst źródłaRajagopal, S., and A. Shenbagavalli. "Design of Real Time Video Encryption System Based on Adaptive Elastic Motion Model in H.264." Journal of Computational and Theoretical Nanoscience 13, no. 10 (2016): 7156–70. http://dx.doi.org/10.1166/jctn.2016.5685.
Pełny tekst źródłaZhang, Ai Li, Si Jia Li, and Zhang Yu. "Research of Encryption Algorithm of Two-Dimensional Barcode Based on Pseudo Fingerprint Feature." Applied Mechanics and Materials 687-691 (November 2014): 3036–39. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3036.
Pełny tekst źródła