Artykuły w czasopismach na temat „Encryption module”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Encryption module”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Liu, Guanxiu. "The Application of Data Encryption Technology in Computer Network Communication Security." Mobile Information Systems 2022 (August 29, 2022): 1–10. http://dx.doi.org/10.1155/2022/3632298.
Pełny tekst źródłaKaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.
Pełny tekst źródłaLi, Hongming, Lilai Zhang, Hao Cao, and Yirui Wu. "Hash Based DNA Computing Algorithm for Image Encryption." Applied Sciences 13, no. 14 (2023): 8509. http://dx.doi.org/10.3390/app13148509.
Pełny tekst źródłaAitkhozhayeva, Y. Zh, and D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.
Pełny tekst źródłaSun, Wen Jie. "Research on General Permutation Encryption Module Based on Chaos Theory." Applied Mechanics and Materials 686 (October 2014): 381–87. http://dx.doi.org/10.4028/www.scientific.net/amm.686.381.
Pełny tekst źródłaSon, Byounghee, Euiseok Nahm, and Hagbae Kim. "VoIP encryption module for securing privacy." Multimedia Tools and Applications 63, no. 1 (2012): 181–93. http://dx.doi.org/10.1007/s11042-011-0956-1.
Pełny tekst źródłaZhao, Dongfang. "Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis." Cryptography 9, no. 2 (2025): 44. https://doi.org/10.3390/cryptography9020044.
Pełny tekst źródłaKe, Chih Kun, and Zheng Hua Lin. "Secure Data Synchronization over a Mobile Peer-to-Peer Network." Applied Mechanics and Materials 764-765 (May 2015): 950–54. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.950.
Pełny tekst źródłaMukherjee, Anisha, Aikata Aikata, Ahmet Can Mert, et al. "ModHE: Modular Homomorphic Encryption Using Module Lattices." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (2023): 527–62. http://dx.doi.org/10.46586/tches.v2024.i1.527-562.
Pełny tekst źródłaLi, Hong Ye, Guang Hui Cai, Hong Chao Sun, and Xiao Cong Ma. "Design and Implementation of AES Key Generator Based on FPGA." Advanced Materials Research 1022 (August 2014): 104–7. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.104.
Pełny tekst źródłaVishaka, Ambardar, and Munish Rattan Dr. "Implementation of Secured MIPS Pipeline Processor using RC6 Algorithm with Vhdl." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 2 (2015): 227–31. https://doi.org/10.5281/zenodo.32429.
Pełny tekst źródłaSeniv, Maksym M., Sviatoslav I. Rovenchak, and Vitaliy S. Yakovyna. "Software implementation of the data encryption module on the BeagleBone platform for data transmission systems with increased cryptoresistance." Herald of Advanced Information Technology 6, no. 4 (2023): 338–51. http://dx.doi.org/10.15276/hait.06.2023.22.
Pełny tekst źródłaD, Narmatha, Jenifa W, Merlin Moses M, and Prem Kumar J. "Text File Encryption and Decryption by FFT and IFFT Algorithm Using Lab view." Journal of Communication Engineering and Its Innovations 5, no. 3 (2019): 8–15. https://doi.org/10.5281/zenodo.3525834.
Pełny tekst źródłaLIN, XIN, WEIHUI SHI, and YONGXIANG DU. "INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM." International Journal of Modeling, Simulation, and Scientific Computing 04, no. 04 (2013): 1342005. http://dx.doi.org/10.1142/s1793962313420051.
Pełny tekst źródłaHan, Ke, Youyan Duan, Rui Jin, Wendou Wu, Baijuan Wang, and Xiaobo Cai. "Optimal Design of Encryption Module in IoT." Procedia Computer Science 187 (2021): 481–87. http://dx.doi.org/10.1016/j.procs.2021.04.087.
Pełny tekst źródłaChen, Xiao, and De Xin Yao. "Multiway Responder with Wireless Communication Technology." Applied Mechanics and Materials 39 (November 2010): 465–69. http://dx.doi.org/10.4028/www.scientific.net/amm.39.465.
Pełny tekst źródłaKalimoldayev, M., S. Tynymbayev, M. Ibraimov, M. Magzom, Y. Kozhagulov, and T. Namazbayev. "PIPELINE MULTIPLIER OF POLYNOMIALS MODULO WITH ANALYSIS OF HIGH-ORDER BITS OF THE MULTIPLIER." BULLETIN 386, no. 4 (2020): 13–20. http://dx.doi.org/10.32014/2020.2518-1467.98.
Pełny tekst źródłaZhao, Ruihang, and Wei Zhang. "Design and Implementation of AGV Scheduling System based on Spring." Journal of Physics: Conference Series 2320, no. 1 (2022): 012010. http://dx.doi.org/10.1088/1742-6596/2320/1/012010.
Pełny tekst źródłaSahana, B. M., Rohith S, Sandhiya C, and Padalingam Padalingam. "Securing Cloud Storage Using Homomorphic Encryption." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43782.
Pełny tekst źródłaИСМАГИЛОВА, А. С., and Н. Д. ЛУШНИКОВ. "SOFTWARE MODULE ENCRYPTING USER BIOMETRIC DATA." Автометрия 59, no. 4 (2023): 20–28. http://dx.doi.org/10.15372/aut20230403.
Pełny tekst źródłaV. Kinge, Pravin, S. J. Honale, and C. M. Bobade. "Design of AES Pipelined Architecture for Image Encryption/Decryption Module." International Journal of Reconfigurable and Embedded Systems (IJRES) 3, no. 3 (2014): 114. http://dx.doi.org/10.11591/ijres.v3.i3.pp114-118.
Pełny tekst źródłaXu, Changhui, Jingkui Zhang, Zhiyou Zhang, Jianning Hou, and Xujie Wen. "Data and Service Security of GNSS Sensors Integrated with Cryptographic Module." Micromachines 14, no. 2 (2023): 454. http://dx.doi.org/10.3390/mi14020454.
Pełny tekst źródłaAaruni, P. M., Baby Aleena, Antony Angel, Benny Binsha, and Gopinath Anjaly. "Substitution Box Optimization." Journal of Electronics and Communication Systems 4, no. 3 (2019): 21–24. https://doi.org/10.5281/zenodo.3531510.
Pełny tekst źródłaTsmots, Ivan, Vasyl Rabyk, and Yurii Lukashchuk. "Development of Mobile Facilities of Neuro-like Cryptographic Encryption and Decryption of Data in Real Time." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 9 (June 10, 2021): 84–95. http://dx.doi.org/10.23939/sisn2021.09.084.
Pełny tekst źródłaLiu, Xiaowei, and Hongjin Liu. "Design of English Mobile Learning Platform Based on GSM-R Wireless Network Communication System." International Journal of Antennas and Propagation 2021 (September 30, 2021): 1–9. http://dx.doi.org/10.1155/2021/9944169.
Pełny tekst źródłaLi, Weijing, Zicheng Zhou, Wen Fan, and Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology." Wireless Communications and Mobile Computing 2022 (July 13, 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.
Pełny tekst źródłaKachko, O. G., Yu I. Gorbenko, M. V. Esina, and O. S. Akolzina. "Optimization of NTRU Prime asymmetric encryption algorithm." Radiotekhnika, no. 191 (December 22, 2017): 5–10. http://dx.doi.org/10.30837/rt.2017.4.191.01.
Pełny tekst źródłaLalu Prasad Jamana, Swapna Annapareddy, Lakshmi Narayana Kolipakula, Ganesh Dasu, and Sadhik Shaik. "Blockchain-based two-level QR Code: A new era of secure data sharing." International Journal of Science and Research Archive 15, no. 1 (2025): 147–54. https://doi.org/10.30574/ijsra.2025.15.1.0933.
Pełny tekst źródłaKarimov, Madjit Malikovich ,., Nizomiddin Najmiddin Ugli Ochilov, and Abdiqahhar Egamovich Tangirov. "Encryption Methods and Algorithms Based on Domestic Standards in Open-Source Operating Systems." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 20 (February 20, 2023): 42–49. http://dx.doi.org/10.37394/23209.2023.20.6.
Pełny tekst źródłaAstha, tiwari, and Muhammad Arif Prof. "Design and Verification of ASIP- Dual Modified Key Generator Based Encryption for Cloud Storage." International Journal of Advanced and Innovative Research 7, no. 2 (2018): 40–45. https://doi.org/10.5281/zenodo.1184880.
Pełny tekst źródłaObour Agyekum, Kwame, Qi Xia, Emmanuel Sifah, et al. "A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain." Sensors 19, no. 5 (2019): 1235. http://dx.doi.org/10.3390/s19051235.
Pełny tekst źródłaLi, X. Y. "A Service Oriented Jewelry Image Watermarking Encryption Method." Advanced Materials Research 1049-1050 (October 2014): 1339–42. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1339.
Pełny tekst źródłaM S, Shrikanth, and Ashwini C. "Smart Tender Management System Using Blockchain in Python." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem36750.
Pełny tekst źródłaSMIRNOVA, TETIANA, NATALIIA YAKYMENKO, OLEKSII SMIRNOV, LIUDMYLA POLISHCHUK, and SERHII SMIRNOV. "STUDY OF STATISTICAL STABILITY AND FAST CHARACTERISTICS OF THE PROPOSED HASHING FUNCTION OF THE IMPROVED CRYPTOGRAPHIC MODULE IN INFORMATION AND COMMUNICATION SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 307, no. 2 (2022): 46–52. http://dx.doi.org/10.31891/2307-5732-2022-307-2-46-52.
Pełny tekst źródłaSmirnova, Tetiana, Nataliia Yakymenko, Oleksandr Ulichev, Oksana Konoplitska-Slobodeniuk Konoplitska-Slobodeniuk, and Serhii Smirnov. "INVESTIGATION OF LINEAR TRANSFORMATIONS OF THE PROPOSED HUSHING FUNCTION OF THE ADVANCED MODULE OF CRYPTOGRAPHIC PROTECTION IN INFORMATION AND CIRCUMSTANCES." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 85–92. http://dx.doi.org/10.28925/2663-4023.2022.15.8592.
Pełny tekst źródłaDang, Chi Van, Khoat Duc Nguyen, Luc The Nguyen, Dung Ngoc Le, Quan Hong Luu, and Son Thanh Huynh. "Applying AES algorithm for secure data transmission between Sensor node and LoRa Gateway to Web Server." Journal of Mining and Earth Sciences 63, no. 1 (2022): 105–14. http://dx.doi.org/10.46326/jmes.2022.63(1).10.
Pełny tekst źródłaSaha, Mainak, M. Trinath Basu, Arpita Gupta, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 132. https://doi.org/10.11591/ijict.v14i1.pp132-140.
Pełny tekst źródłaMainak, Saha, Trinath Basu M., Gupta Arpita, et al. "Enhancing credit card security using RSA encryption and tokenization: a multi-module approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 132–40. https://doi.org/10.11591/ijict.v14i1.pp132-140.
Pełny tekst źródłaRhee, Eugene, and Jihoon Lee. "Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1416. http://dx.doi.org/10.11591/ijeecs.v33.i3.pp1416-1423.
Pełny tekst źródłaRhee, Eugene, and Jihoon Lee. "Enhanced ARIA-based counter mode deterministic random bit generator random number generator implemented in verilog." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1416–23. https://doi.org/10.11591/ijeecs.v33.i3.pp1416-1423.
Pełny tekst źródłaElkhodr, Mahmoud, Samiya Khan, and Ergun Gide. "A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness." Future Internet 16, no. 1 (2024): 22. http://dx.doi.org/10.3390/fi16010022.
Pełny tekst źródłaMr G shekar, Asthami Sai Kiran, Muthe Harish, and Padala Sai Rahul. "Multi tenancy cloud data with a shared privacy preserving trusted keyword search." International Journal of Information Technology and Computer Engineering 13, no. 2 (2025): 1290–95. https://doi.org/10.62647/ijitce2025v13i2pp1290-1295.
Pełny tekst źródłaLi, Yuehua, Chengcheng Wang, Jiahao Sun, Zhijin Guan, Jiaqing Chen, and Zelin Wang. "Research and Application of Encryption System Based on Quantum Circuit for Mobile Internet Security." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 4 (2021): 1–17. http://dx.doi.org/10.4018/ijcini.20211001.oa26.
Pełny tekst źródłaPapadopoulos, Iason, and Jiabo Wang. "Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber." Cryptography 7, no. 1 (2023): 2. http://dx.doi.org/10.3390/cryptography7010002.
Pełny tekst źródłaFahlevi, Reza, and Muhammad Salman. "Design of Data Security Module Using Key-Policy Attribute Based Encryption (KP-ABE) Algorithm for an Internet-of-Things System." Jurnal Penelitian Pendidikan IPA 10, no. 11 (2024): 9825–31. https://doi.org/10.29303/jppipa.v10i11.8289.
Pełny tekst źródłaPathak, Aditya, Anmol Kaur, and Sagar. "Data Encryption Using Morse Code." CGC International Journal of Contemporary Technology and Research 4, no. 2 (2022): 319–22. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.319.
Pełny tekst źródłaSalnikov, Dmytro, Dmytro Karaman, and Viktoriia Krylova. "HIGHLY RECONFIGURABLE SOFT-CPU BASED PERIPHERAL MODULES DESIGN." Advanced Information Systems 7, no. 2 (2023): 92–97. http://dx.doi.org/10.20998/2522-9052.2023.2.13.
Pełny tekst źródłaChaukade, Anmol Kumar, and P. Murali. "A Study of Colour Image Encryption with Chaos Logistic Map and DNA Encoding Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1121–27. http://dx.doi.org/10.22214/ijraset.2022.40834.
Pełny tekst źródłaYu, Wen-Kai, Shuo-Fei Wang, and Ke-Qian Shang. "Optical Encryption Using Attention-Inserted Physics-Driven Single-Pixel Imaging." Sensors 24, no. 3 (2024): 1012. http://dx.doi.org/10.3390/s24031012.
Pełny tekst źródłaLiu, Jinhua, Caiping Wang, and Xianchun Xiao. "Design and Application of Science and Technology Project Management Information System for Educational Institutes." Mobile Information Systems 2021 (September 25, 2021): 1–10. http://dx.doi.org/10.1155/2021/2074495.
Pełny tekst źródła