Artykuły w czasopismach na temat „Transparent Data Encryption (TDE)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Transparent Data Encryption (TDE)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Vijay, Kumar Tiwari. "About Oracle TDE (Transparent Data Encryption)." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 1085. https://doi.org/10.5281/zenodo.3609978.
Pełny tekst źródłaResearcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.
Pełny tekst źródłaBeley, Olexander. "FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (2018): 12–15. http://dx.doi.org/10.5604/01.3001.0012.8013.
Pełny tekst źródłaSirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.
Pełny tekst źródłaResearcher. "COMPREHENSIVE REVIEW OF INNOVATIONS IN CLOUD INFRASTRUCTURE, AI-DRIVEN CYBERSECURITY, AND ADVANCED IPTV TECHNOLOGIES." Journal of Software Engineering (JSE) 2, no. 2 (2024): 33–42. https://doi.org/10.5281/zenodo.14055967.
Pełny tekst źródłaSibaram, Prasad Panda. "Data Security Mechanisms in Database Management." International Journal of Computer Application 15, no. 3 (2025): 1–14. https://doi.org/10.5281/zenodo.15469196.
Pełny tekst źródłaKaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.
Pełny tekst źródłaAlohali, Manal Abdullah, Mohammed Aljebreen, Fuad Al-Mutiri, et al. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments." Sustainability 15, no. 6 (2023): 5133. http://dx.doi.org/10.3390/su15065133.
Pełny tekst źródłaRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.
Pełny tekst źródłaRanga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.
Pełny tekst źródłaMaurya, Arvind Kumar, Avinash Singh, Unnati Dubey, and Shivansh Pandey and Upendra Nath Tripathi. "Protection of Data Stored in Transparent Database System using Encryption." Journal of Computer and Mathematical Sciences 10, no. 1 (2019): 190–96. http://dx.doi.org/10.29055/jcms/992.
Pełny tekst źródłaJackson, Jennifer, Minmin Jiang, and David Oswald. "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 2 (2025): 268–92. https://doi.org/10.46586/tches.v2025.i2.268-292.
Pełny tekst źródłaNaz, Muqaddas, Fahad A. Al-zahrani, Rabiya Khalid, et al. "A Secure Data Sharing Platform Using Blockchain and Interplanetary File System." Sustainability 11, no. 24 (2019): 7054. http://dx.doi.org/10.3390/su11247054.
Pełny tekst źródłaHan, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.
Pełny tekst źródłaHuang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.
Pełny tekst źródłaMaharani, Herliana Wahyu. "Application of Blockchain Technology for Digital Transaction Security on Business Incubator Websites." Conference Series 2, no. 11 (2020): 8–14. http://dx.doi.org/10.34306/conferenceseries.v2i11.328.
Pełny tekst źródłaDliyanti, Aulia. "Creative Economy of College Student Gamification based on E-Commerce." Conference Series 2, no. 11 (2020): 22–30. http://dx.doi.org/10.34306/conferenceseries.v2i11.330.
Pełny tekst źródłaXu, Yong Kang, Zheng Jing Wan, Ji Lan Zhang, and Jia Ju Wu. "Research and Implementation of Relational Database Encryption Technology Based on Main Memory Database." Applied Mechanics and Materials 571-572 (June 2014): 591–99. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.591.
Pełny tekst źródłaMunish Saran,. "A Secure Framework based on Sensor-Cloud architecture for Healthcare data using enhanced Elliptic Curve Encryption." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 37–49. https://doi.org/10.52783/cana.v32.3836.
Pełny tekst źródłaBamigbade, Oluwatobi. "Balancing Encryption Laws and National Security: Challenges for Data and Energy Sector Collaboration across Borders." Journal of Engineering Research and Reports 27, no. 6 (2025): 193–213. https://doi.org/10.9734/jerr/2025/v27i61538.
Pełny tekst źródłaDidi, Rosiyadi, Indra Basuki Akbari, Iqbal Ramdhani Taufik, Susanto Heru, and Hasani Siregar Yusnan. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388–400. https://doi.org/10.11591/ijece.v13i4.pp4388-4400.
Pełny tekst źródłaRosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.
Pełny tekst źródłaGao, Lixia. "Enterprise internal audit data encryption based on blockchain technology." PLOS ONE 20, no. 1 (2025): e0315759. https://doi.org/10.1371/journal.pone.0315759.
Pełny tekst źródłaAl Jaoufi, Mohammed Ahmed Ahmed, Yun Liu, and Zhen Jiang Zhang. "A Safe and Transparent Sensor Network Data Aggregation (STDA) Program." Advanced Materials Research 1079-1080 (December 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.591.
Pełny tekst źródłaAhmed, Musa Midila, and Aishatu Musa Ahmed. "Citizens’ Data Protection in E-government System." International Journal of Innovative Computing 13, no. 2 (2023): 1–9. http://dx.doi.org/10.11113/ijic.v13n2.389.
Pełny tekst źródłaKeenan, Bernard. "State access to encrypted data in the United Kingdom: The ‘transparent’ approach." Common Law World Review 49, no. 3-4 (2019): 223–44. http://dx.doi.org/10.1177/1473779519892641.
Pełny tekst źródłaSiva, Krishna Jampani. "AI and Blockchain Integration for Enhanced Cloud Storage Security and Encryption." European Journal of Advances in Engineering and Technology 8, no. 3 (2021): 92–98. https://doi.org/10.5281/zenodo.14637332.
Pełny tekst źródłaKhashan, Osama A., Nour M. Khafajah, Waleed Alomoush, et al. "Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors." Cryptography 7, no. 1 (2023): 12. http://dx.doi.org/10.3390/cryptography7010012.
Pełny tekst źródłaCh. Jyothi, Gaddam Udaya Sri, Manya Madhuri, Beena Kumari, and P. Udhay Kiran. "SECUREFILECHAIN: A BIOMETRIC-DRIVEN AND CHACHA ENHANCED FRAMEWORK FOR PRIVACY-PRESERVING DATA SHARING IN CYBER-PHYSICAL-SOCIAL SYSTEMS." International Journal of Engineering Research and Science & Technology 21, no. 3 (1) (2025): 608–15. https://doi.org/10.62643/ijerst.v21.n3(1).pp608-615.
Pełny tekst źródłaIqbal, Ahmed, and Irfan Alam Fahim. "Integrity verification for an optimized cloud architecture." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 166–73. https://doi.org/10.12928/TELKOMNIKA.v18i1.14105.
Pełny tekst źródłaAmoruso, Edward L., Richard Leinecker, and Cliff C. Zou. "User Privacy Protection via Windows Registry Hooking and Runtime Encryption." Sensors 24, no. 16 (2024): 5106. http://dx.doi.org/10.3390/s24165106.
Pełny tekst źródłaPuchala, Dariusz, Kamil Stokfiszewski, and Mykhaylo Yatsymirskyy. "Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard." Entropy 23, no. 4 (2021): 421. http://dx.doi.org/10.3390/e23040421.
Pełny tekst źródłaBenaich, Rihab, Saida El Mendili, and Youssef Gahi. "Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records." HighTech and Innovation Journal 4, no. 3 (2023): 630–52. http://dx.doi.org/10.28991/hij-2023-04-03-012.
Pełny tekst źródłaElbarbary, Enas, Ghada Abdelhady, Hussam Elbehiery, and Abdelhalim Zekry. "Secured Transparent Computerized Voting System performance measurements." International Journal of Engineering & Technology 4, no. 2 (2015): 327. http://dx.doi.org/10.14419/ijet.v4i2.4441.
Pełny tekst źródłaLandge, Mr Sarang. "A Blockchain-Powered E-Voting System with SHA-256 Encryption." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32060.
Pełny tekst źródłaA, Mahesh Chandra. "Smart Contract-Based E-Commerce System for Transparent and Auto Bmated Transactions Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3123–31. https://doi.org/10.22214/ijraset.2025.68856.
Pełny tekst źródłaElsa Wulandari, Annastasya Nabila, and Purwono. "Smart Contracts for Data Sharing in Drug Development a Systematic Review of Security and Transparent Measurement." Journal of Advanced Health Informatics Research 2, no. 1 (2024): 24–37. https://doi.org/10.59247/jahir.v2i1.288.
Pełny tekst źródłaDemertzis, Konstantinos, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis, and Lazaros Iliadis. "A Secure and Privacy-Preserving Blockchain-Based XAI-Justice System." Information 14, no. 9 (2023): 477. http://dx.doi.org/10.3390/info14090477.
Pełny tekst źródłaMohanty, Dr Rajnikanth. "BlockShare – Blockchain Based Secure Data Sharing Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46157.
Pełny tekst źródłaRuth Ramya, K., D. N.V.Saikrishna, T. Sravya Nandini, and R. Tanmai Gayatri. "A Survey on Using Biometrics for Cloud Security." International Journal of Engineering & Technology 7, no. 2.32 (2018): 307. http://dx.doi.org/10.14419/ijet.v7i2.32.15701.
Pełny tekst źródłaAli, Aitizaz, Bander Ali Saleh Al-rimy, Faisal S. Alsubaei, Abdulwahab Ali Almazroi, and Abdulaleem Ali Almazroi. "HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications." Sensors 23, no. 15 (2023): 6762. http://dx.doi.org/10.3390/s23156762.
Pełny tekst źródłaLitvinov, V. S., A. A. Vlasov, and D. V. Teytelbaum. "Development of Software for Transparent Remote Access to Technological Parameters of Drilling and Data from a Downhole Telemetry System in Unstable Communication Conditions." Vestnik NSU. Series: Information Technologies 17, no. 2 (2019): 101–13. http://dx.doi.org/10.25205/1818-7900-2019-17-2-101-113.
Pełny tekst źródłaAwasare, Om R. "Advanced Cryptographic Technologies in Blockchain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51038.
Pełny tekst źródłaJamali, Mujeeb-ur-Rehman, Dr Najma Nawaz Channa, Aadil Jamali, Asad Ali Jamali, Mazher Ali, and Abdul Khalique Baloch. "Blockchain Technology Performance of Asymmetric Algorithms: An Empirical Study." VFAST Transactions on Software Engineering 11, no. 3 (2023): 10–24. http://dx.doi.org/10.21015/vtse.v11i3.1580.
Pełny tekst źródłaGarcia Valencia, Oscar A., Supawadee Suppadungsuk, Charat Thongprayoon, et al. "Ethical Implications of Chatbot Utilization in Nephrology." Journal of Personalized Medicine 13, no. 9 (2023): 1363. http://dx.doi.org/10.3390/jpm13091363.
Pełny tekst źródłaVittal Rao Baikadolla. "Balancing Innovation and Privacy: Addressing Surveillance Concerns in Healthcare AI Systems." Journal of Computer Science and Technology Studies 7, no. 7 (2025): 921–29. https://doi.org/10.32996/jcsts.2025.7.7.101.
Pełny tekst źródłaChananagari Prabhakar, Rohit Reddy. "Enhancing Data Security in Higher Education Administration: Strategies for Protecting Student Information and Institutional Integrity in Cloud-Based Systems." Journal of Artificial Intelligence & Cloud Computing 2, no. 3 (2023): 1–4. http://dx.doi.org/10.47363/jaicc/2023(2)e150.
Pełny tekst źródłaRamakrishnan, Mr R., B. Beula grace, and K. Shanmugapriya. "Civis ID with True Face: A Biometric Voting System for Secure and Transparent Elections." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02169.
Pełny tekst źródłaSathyananda Kumar Pamarthy. "Implementing Robust Data Privacy and Security in Modern ERP Systems: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2360–65. https://doi.org/10.32628/cseit251112258.
Pełny tekst źródłaSavchenko, Mykyta, Vitaliy Tsyganok, and Oleh Andriichuk. "Decision Support Systems' Security Model Based on Decentralized Data Platforms." Decision Support Systems' Security Model Based on Decentralized Data Platforms 2318 (June 7, 2018): 209–21. https://doi.org/10.5281/zenodo.13843777.
Pełny tekst źródła