Статті в журналах з теми "INVERSION-ENCRYPTION METHOD"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-37 статей у журналах для дослідження на тему "INVERSION-ENCRYPTION METHOD".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Khan, Sajid, Lansheng Han, Ghulam Mudassir, Bachira Guehguih, and Hidayat Ullah. "3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA." Entropy 21, no. 11 (2019): 1075. http://dx.doi.org/10.3390/e21111075.
Повний текст джерелаCheng, Peng, and Huai Xun Zhao. "A Novel Image Encryption Algorithm Based on Cellular Automata and Chaotic System." Advanced Materials Research 998-999 (July 2014): 797–801. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.797.
Повний текст джерелаA., Shanooja M., and Anil Kumar M. N. "A Technique for Image Encryption Using the Modular Multiplicative Inverse Property of Mersenne Primes." Symmetry 17, no. 2 (2025): 166. https://doi.org/10.3390/sym17020166.
Повний текст джерелаLokesh Reddy, B., and Anith Nelleri. "Single-Pixel Compressive Digital Holographic Encryption System Based on Circular Harmonic Key and Parallel Phase Shifting Digital Holography." International Journal of Optics 2022 (July 14, 2022): 1–20. http://dx.doi.org/10.1155/2022/6298010.
Повний текст джерелаLI, Huixian, Fulei WANG, Chun SHEN, Shiyuan LIU, and Liaojun PANG. "Small interval interpolation fitting bootstrapping method based on residue number system." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 5 (2024): 969–78. https://doi.org/10.1051/jnwpu/20244250969.
Повний текст джерелаLiao, Jia, Baihui Jiang, Peng Zhao, Lei Ning, and Liming Chen. "Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment." Electronics 12, no. 18 (2023): 3938. http://dx.doi.org/10.3390/electronics12183938.
Повний текст джерелаSun, Zhe, Weiping Li, Junxi Liang, et al. "A Blockchain-Based Fairness Guarantee Approach for Privacy-Preserving Collaborative Training in Computing Force Network." Mathematics 12, no. 5 (2024): 718. http://dx.doi.org/10.3390/math12050718.
Повний текст джерелаXi, Yuzhou, Yu Ning, Jie Jin, and Fei Yu. "A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption." Mathematics 12, no. 24 (2024): 3948. https://doi.org/10.3390/math12243948.
Повний текст джерелаNaseer, Yasir, Tariq Shah, Dawood Shah, and Sadam Hussain. "A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes." Cryptography 3, no. 1 (2019): 6. http://dx.doi.org/10.3390/cryptography3010006.
Повний текст джерелаLi, Jiakun, and Wei Gao. "Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA." Journal of Sensors 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/9074524.
Повний текст джерелаAkinyemi, Lateef A., and Bukola H. Akinwole. "Performance Evaluation of Laguerre Transform and Neural Network-based Cryptographic Techniques for Network Security." International Journal of Intelligent Systems and Applications 16, no. 3 (2024): 1–17. http://dx.doi.org/10.5815/ijisa.2024.03.01.
Повний текст джерелаIbrahim, Atef, and Fayez Gebali. "Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier." Systems 13, no. 3 (2025): 154. https://doi.org/10.3390/systems13030154.
Повний текст джерелаAaruni, P. M., Baby Aleena, Antony Angel, Benny Binsha, and Gopinath Anjaly. "Substitution Box Optimization." Journal of Electronics and Communication Systems 4, no. 3 (2019): 21–24. https://doi.org/10.5281/zenodo.3531510.
Повний текст джерелаKareem, Suhad Muhajer, Ayad Al-Adhami, and Abdul Monem S. Rahma. "An improvement for CAST-128 encryption based on magic square and matrix inversion." Bulletin of Electrical Engineering and Informatics 13, no. 1 (2024): 377–87. http://dx.doi.org/10.11591/eei.v13i1.5340.
Повний текст джерелаZhang, Xing, Xiaoyu Jiang, Zhaolin Jiang, and Heejung Byun. "Algorithms for solving a class of real quasi-symmetric Toeplitz linear systems and its applications." Electronic Research Archive 31, no. 4 (2023): 1966–81. http://dx.doi.org/10.3934/era.2023101.
Повний текст джерелаOgunmolu, Akinde Michael. "Enhancing Data Security in Artificial Intelligence Systems: A Cybersecurity and Information Governance Approach." Journal of Engineering Research and Reports 27, no. 5 (2025): 154–72. https://doi.org/10.9734/jerr/2025/v27i51500.
Повний текст джерелаGuo, Pengxin, Shuang Zeng, Wenhao Chen, et al. "A New Federated Learning Framework Against Gradient Inversion Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 16 (2025): 16969–77. https://doi.org/10.1609/aaai.v39i16.33865.
Повний текст джерелаMohandas, Dr R., Dr S. Veena, G. Kirubasri, I. Thusnavis Bella Mary, and Dr R. Udayakumar. "Federated Learning with Homomorphic Encryption for Ensuring Privacy in Medical Data." Indian Journal of Information Sources and Services 14, no. 2 (2024): 17–23. http://dx.doi.org/10.51983/ijiss-2024.14.2.03.
Повний текст джерелаKumar, Rahul, Chin-Shiuh Shieh, Prasun Chakrabarti, Ashok Kumar, Jhankar Moolchandani, and Raj Sinha. "Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies." EPJ Web of Conferences 328 (2025): 01066. https://doi.org/10.1051/epjconf/202532801066.
Повний текст джерелаEzeogu, Favour Lewechi, Chidiebube Nelson Ozioko, Ihuoma Remita Uchenna, Innocent Junior Opara, and Salvation Ifechukwude Atalor. "Securing AI-Powered Healthcare Decision Support Systems: A Comprehensive Review of Attack Vectors and Defensive Strategies." Asian Journal of Advanced Research and Reports 19, no. 6 (2025): 1–11. https://doi.org/10.9734/ajarr/2025/v19i61037.
Повний текст джерелаGhilom, Milkias, and Shahram Latifi. "The Role of Machine Learning in Advanced Biometric Systems." Electronics 13, no. 13 (2024): 2667. http://dx.doi.org/10.3390/electronics13132667.
Повний текст джерелаRatan, Ram, and Arvind Yadav. "Key Independent Image Deciphering using Neighbourhood Similarity Characteristics and Divide-And-Conquer Attack." Recent Patents on Engineering 14 (July 19, 2020). http://dx.doi.org/10.2174/1872212114999200719144548.
Повний текст джерелаWu, Ximei, Chen Zhong, Bofeng Long, Tongzhe Liu, Chenchen He, and Lujie Wang. "Chaotic image encryption algorithm based on dynamic Hachimoji DNA coding and computing." Physica Scripta, March 11, 2024. http://dx.doi.org/10.1088/1402-4896/ad3245.
Повний текст джерелаAmudha, P., and J. Jayapriya. "An Application for Pair Sum Modulo Labeling in Cryptography." Revista Internacional de Métodos Numéricos para Cálculo y Diseño en Ingeniería 41, no. 1 (2025). https://doi.org/10.23967/j.rimni.2025.10.63629.
Повний текст джерелаJhansi Rani Ganapa, Poonam Joshi, T Amitha, et al. "Security and Privacy Challenges in Deep Learning Models Hosted on Cloud Platforms." International Journal of Computational and Experimental Science and Engineering 11, no. 3 (2025). https://doi.org/10.22399/ijcesen.3235.
Повний текст джерелаLi, Zhenqiang, Fei Gao, Sujuan Qin, and Qiaoyan Wen. "New record in the number of qubits for a quantum implementation of AES." Frontiers in Physics 11 (March 24, 2023). http://dx.doi.org/10.3389/fphy.2023.1171753.
Повний текст джерелаБЕЛОВ, С. А. "Метод построения полинома одной переменной над конечным полем раундовой функции блочных шифров". Международный научный журнал "Современные информационные технологии и ИТ-образование" 14, № 3 (2018). https://doi.org/10.25559/sitito.14.201803.586-593.
Повний текст джерелаPetrean, Diana-Elena, and Rodica Potolea. "Random forest evaluation using multi-key homomorphic encryption and lookup tables." International Journal of Information Security, March 14, 2024. http://dx.doi.org/10.1007/s10207-024-00823-1.
Повний текст джерелаSielaff, Lennard, Ruben Hetfleisch, and Michael Rader. "Evaluation Framework for the Use of Privacy Preserving Technologies for Production Data." Proceedings of the International Conference on Advanced Technologies, August 19, 2023. http://dx.doi.org/10.58190/icat.2023.33.
Повний текст джерелаShadab, Mohd, Md Saquib Jawed, and Mohammad Sajid. "Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach." SECURITY AND PRIVACY, September 26, 2024. http://dx.doi.org/10.1002/spy2.462.
Повний текст джерелаKlamti, Jean, M. Hasan, and Koray Karabina. "Efficient Methods for Simultaneous Homomorphic Inversion." IACR Communications in Cryptology 2, no. 1 (2025). https://doi.org/10.62056/abe0iv7sf.
Повний текст джерелаAlaverdyan, Y. Ts, and E. G. Satimova. "Fully Homomorphic Cipher Based on Finite Algebraic Structures." Earthline Journal of Mathematical Sciences, January 18, 2019, 97–103. http://dx.doi.org/10.34198/ejms.1119.97103.
Повний текст джерелаSuhad, Muhajer Kareem, Al-Adhami Ayad, and Monem S. Rahma Abdul. "An improvement for CAST-128 encryption based on magic square and matrix inversion." Bulletin of Electrical Engineering and Informatics (BEEI) 13, no. 1 (2024). https://doi.org/10.11591/eei.v13i1.5340.
Повний текст джерелаPasunuru, Sreekanth, and Anil Kumar Malipeddi. "Securing AI Models: Cryptographic Approaches to Protect AI Algorithms and Data." Journal of Artificial Intelligence & Cloud Computing, August 31, 2024, 1–3. https://doi.org/10.47363/jaicc/2024(3)e247.
Повний текст джерелаKHOWAJA, SUNDER A., PARUS KHUWAJA, KAPAL DEV, et al. "Block Encryption LAyer (BELA): Zero-Trust Defense Against Model Inversion Attacks for Federated Learning in 5G/6G Systems." January 6, 2025. https://doi.org/10.1109/OJCOMS.2025.3526768.
Повний текст джерелаKhowaja, Sunder A., Parus Khuwaja, Kapal Dev, et al. "Block Encryption LAyer (BELA): Zero-Trust Defense Against Model Inversion Attacks for Federated Learning in 5G/6G Systems." January 6, 2025. https://doi.org/10.1109/OJCOMS.2024.011100.
Повний текст джерелаChen, Fan, Lingfeng Qu, Hadi Amirpour, Christian Timmerer, and Hongjie He. "Counterfeiting Attacks on a RDH-EI scheme based on block-permutation and Co-XOR." ACM Transactions on Multimedia Computing, Communications, and Applications, February 25, 2025. https://doi.org/10.1145/3719294.
Повний текст джерела