Works matching DE "DATA encryption"
1
- Lamp (0047-3936), 2017, v. 74, n. 5, p. 29
- Article
2
- Information Systems & e-Business Management, 2020, v. 18, n. 3, p. 379, doi. 10.1007/s10257-019-00419-6
- Subashanthini, S.;
- Pounambal, M.
- Article
3
- Computing & Control Engineering, 2006, v. 17, n. 4, p. 12, doi. 10.1049/cce:20060402
- Article
4
- International Journal of Wavelets, Multiresolution & Information Processing, 2019, v. 17, n. 5, p. N.PAG, doi. 10.1142/S0219691319500346
- Article
5
- International Journal of Wavelets, Multiresolution & Information Processing, 2017, v. 15, n. 3, p. -1, doi. 10.1142/S0219691317500205
- Kasana, Geeta;
- Singh, Kulbir;
- Bhatia, Satvinder Singh
- Article
6
- Chemistry - A European Journal, 2023, v. 29, n. 65, p. 1, doi. 10.1002/chem.202302376
- Preda, Giovanni;
- Jung, Sebastian;
- Pescitelli, Gennaro;
- Cupellini, Lorenzo;
- Armspach, Dominique;
- Pasini, Dario
- Article
7
- Advanced Functional Materials, 2017, v. 27, n. 35, p. n/a, doi. 10.1002/adfm.201701866
- Heydari, Esmaeil;
- Sperling, Justin R.;
- Neale, Steven L.;
- Clark, Alasdair W.
- Article
8
- Algebra Colloquium, 2011, v. 18, p. 847, doi. 10.1142/S1005386711000733
- Jain, Sapna;
- Shum, K. P.;
- Li, Fu-an
- Article
9
- Jurnal Mantik, 2024, v. 8, n. 3, p. 1540
- Irsyad, Ziqrurrahman;
- Indraningsih, Nurul Hidayati
- Article
10
- International Journal of Image & Graphics, 2024, v. 24, n. 5, p. 1, doi. 10.1142/S0219467823400041
- Prathibha, L.;
- Fatima, Kaleem
- Article
11
- International Journal of Image & Graphics, 2024, v. 24, n. 1, p. 1, doi. 10.1142/S0219467824500104
- Gadde, Swetha;
- Amutharaj, J.;
- Usha, S.
- Article
12
- International Journal of Image & Graphics, 2010, v. 10, n. 3, p. 327, doi. 10.1142/S0219467810003809
- KARTHIGAIKUMAR, P.;
- BASKARAN, K.
- Article
13
- International Journal of Image & Graphics, 2008, v. 8, n. 3, p. 351, doi. 10.1142/S0219467808003131
- AGARWAL, RASHMI;
- SANTHANAM, M. S.
- Article
14
- International Journal of Image & Graphics, 2007, v. 7, n. 3, p. 481, doi. 10.1142/S0219467807002787
- Article
15
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 67, doi. 10.1142/S0219467805001665
- Lu, Haiping;
- Shi, Yun Q.;
- Kot, Alex C.;
- Chen, Lihui
- Article
16
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 89, doi. 10.1142/S0219467805001677
- Echizen, Isao;
- Fujii, Yasuhiro;
- Yamada, Takaaki;
- Tezuka, Satoru;
- Yoshiura, Hiroshi
- Article
17
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 135, doi. 10.1142/S0219467805001690
- Sun, Qibin;
- Ye, Shuiming;
- Lin, Ching-Yung;
- Chang, Shih-Fu
- Article
18
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 167, doi. 10.1142/S0219467805001719
- Article
19
- Fluctuation & Noise Letters, 2015, v. 14, n. 2, p. -1, doi. 10.1142/S0219477515500078
- Kish, Laszlo B.;
- Granqvist, Claes-Göran
- Article
20
- Nature, 1997, v. 385, n. 6611, p. 47, doi. 10.1038/385047a0
- Article
21
- Nature, 1997, v. 385, n. 6611, p. 17, doi. 10.1038/385017a0
- Article
22
- Nature, 1996, v. 382, n. 6588, p. 198, doi. 10.1038/382198b0
- Article
23
- Nature, 1996, v. 381, n. 6582, p. 454, doi. 10.1038/381454b0
- Article
24
- International Journal of Networked & Distributed Computing, 2024, v. 12, n. 1, p. 108, doi. 10.1007/s44227-023-00019-4
- Sugirtham, N.;
- Jenny, R. Sherine;
- Thiyaneswaran, B.;
- Kumarganesh, S.;
- Venkatesan, C.;
- Sagayam, K. Martin;
- Dang, Lam;
- Dinh, Linh;
- Dang, Hien
- Article
25
- International Journal of Computer Mathematics: Computer Systems Theory, 2024, v. 9, n. 4, p. 243, doi. 10.1080/23799927.2024.2415034
- Ferrara, Maria;
- Tortora, Antonio;
- Tota, Maria
- Article
26
- International Journal of Cognitive Computing in Engineering, 2024, v. 5, p. 44, doi. 10.1016/j.ijcce.2024.01.002
- Krishnamoorthy, Parthiban;
- Sathiyanarayanan, Mithileysh;
- Proença, Hugo Pedro
- Article
27
- Internet of Things & Cyber Physical Systems, 2022, v. 2, p. 1, doi. 10.1016/j.iotcps.2022.02.001
- Ke Wang;
- Shuxuan Xie;
- Rodrigues, Joel
- Article
28
- Internet of Things & Cyber Physical Systems, 2022, v. 2, p. 99, doi. 10.1016/j.iotcps.2022.05.006
- Akter, Shamima;
- Reza, Farhana;
- Ahmed, Manik
- Article
29
- Micro (2673-8023), 2022, v. 2, n. 3, p. 361, doi. 10.3390/micro2030024
- Venkataraman, Anusha;
- Amadi, Eberechukwu;
- Papadopoulos, Chris
- Article
30
- Standards (2305-6703), 2022, v. 2, n. 3, p. 385, doi. 10.3390/standards2030026
- Kang, Bongju;
- Lee, Yangkee
- Article
31
- Network (2673-8732), 2024, v. 4, n. 3, p. 260, doi. 10.3390/network4030013
- El-Hajj, Mohammed;
- Gebremariam, Teklit Haftu
- Article
32
- Network (2673-8732), 2024, v. 4, n. 2, p. 133, doi. 10.3390/network4020007
- Herbst, Jan;
- Rüb, Matthias;
- Sanon, Sogo Pierre;
- Lipps, Christoph;
- Schotten, Hans D.
- Article
33
- Network (2673-8732), 2022, v. 2, n. 2, p. 239, doi. 10.3390/network2020016
- Alsayegh, Muneera;
- Moulahi, Tarek;
- Alabdulatif, Abdulatif;
- Lorenz, Pascal
- Article
34
- Journal of Social & Technology / Jurnal Sosial dan Teknologi (SOSTECH), 2024, v. 4, n. 2, p. 116, doi. 10.59188/jurnalsostech.v4i2.1097
- Article
35
- International Journal of Industrial Electronics Control & Optimization, 2024, v. 7, n. 1, p. 41
- Article
36
- Cihan University-Erbil Scientific Journal, 2024, v. 8, n. 1, p. 70, doi. 10.24086/cuesj.v8n1y2024.pp70-79
- Jasim, Khalid F.;
- Zeki, Akram M.
- Article
37
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 2, p. 294, doi. 10.1049/ise2.12095
- Islam, Faiz Ul;
- Liu, Guangjie;
- Liu, Weiwei;
- Haq, Qazi Mazhar ul
- Article
39
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 51, doi. 10.1049/ise2.12041
- Liu, Shuai;
- Guan, Jie;
- Hu, Bin
- Article
40
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 6, p. 472, doi. 10.1049/ise2.12036
- Zhou, TanPing;
- Li, NingBo;
- Lai, QiQi;
- Yang, XiaoYuan;
- Han, YiLiang;
- Liu, WenChao
- Article
41
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 6, p. 457, doi. 10.1049/ise2.12035
- Article
42
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 6, p. 428, doi. 10.1049/ise2.12033
- Dong, Xingting;
- Hu, Yupu;
- Wang, Baocang;
- Liu, Momeng;
- Gao, Wen
- Article
43
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 5, p. 395, doi. 10.1049/ise2.12028
- Wang, Dachao;
- Wang, Baocang;
- Ping, Yuan
- Article
44
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 5, p. 333, doi. 10.1049/ise2.12026
- Li, Shimin;
- Liang, Bei;
- Mitrokotsa, Aikaterini;
- Xue, Rui
- Article
45
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 459, doi. 10.1049/iet-ifs.2019.0444
- Taherifard, Mohammad;
- Fazeli, Mahdi;
- Patooghy, Ahmad
- Article
46
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 30, doi. 10.1049/iet-ifs.2018.5491
- Zhang, Huang;
- Zhang, Fangguo;
- Wei, Baodian;
- Du, Yusong
- Article
47
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 258, doi. 10.1049/iet-ifs.2018.5365
- Zhang, Zhigang;
- Chang, Chaowen;
- Guo, Zhimin;
- Han, Peisheng
- Article
48
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 1, p. 61, doi. 10.1049/iet-ifs.2018.5187
- Guo, Cheng;
- Tian, Pengxu;
- Chang, Chin‐Chen
- Article
49
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 1, p. 36, doi. 10.1049/iet-ifs.2017.0271
- Mihaljević, Miodrag J.;
- Oggier, Frédérique
- Article
50
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 543, doi. 10.1049/iet-ifs.2017.0440
- Taherifard, Mohammad;
- Patooghy, Ahmad;
- Fazeli, Mahdi
- Article