Works matching DE "ENCRYPTION protocols"
Results: 706
Highly Secure Plasmonic Encryption Keys Combined with Upconversion Luminescence Nanocrystals.
- Published in:
- Advanced Functional Materials, 2018, v. 28, n. 21, p. 1, doi. 10.1002/adfm.201800369
- By:
- Publication type:
- Article
Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 2, p. 1155, doi. 10.1007/s11277-019-06329-7
- By:
- Publication type:
- Article
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA).
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 2, p. 345, doi. 10.1007/s11277-019-06165-9
- By:
- Publication type:
- Article
A High Security RFID System Authentication Protocol Design Base on Cloud Computer.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1255, doi. 10.1007/s11277-017-5192-1
- By:
- Publication type:
- Article
Novel Reversible Design of Advanced Encryption Standard Cryptographic Algorithm for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1427, doi. 10.1007/s11277-018-5647-z
- By:
- Publication type:
- Article
An Enhanced Certificateless Signcryption in the Standard Model.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 3, p. 2693, doi. 10.1007/s11277-017-4995-4
- By:
- Publication type:
- Article
Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 2009, doi. 10.1007/s11277-017-4960-2
- By:
- Publication type:
- Article
An Innovative Application of Virus Taxonomy and Nomenclatures in the Information Technology.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 1, p. 1237, doi. 10.1007/s11277-017-4917-5
- By:
- Publication type:
- Article
Privacy Preserving in Cloud Environment for Obstructed Shortest Path Query.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2305, doi. 10.1007/s11277-017-4299-8
- By:
- Publication type:
- Article
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 65, doi. 10.1007/s11277-017-4152-0
- By:
- Publication type:
- Article
Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2973, doi. 10.1007/s11277-017-3979-8
- By:
- Publication type:
- Article
A Flexible Fully Homomorphic Encryption.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 761, doi. 10.1007/s11277-016-3796-5
- By:
- Publication type:
- Article
A New Certificateless and Secure Authentication Scheme for Ad hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2833, doi. 10.1007/s11277-016-3721-y
- By:
- Publication type:
- Article
Improved Hash Functions for Cancelable Fingerprint Encryption Schemes.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 1, p. 643, doi. 10.1007/s11277-015-2654-1
- By:
- Publication type:
- Article
Secure Content Distribution Using Multi-hop Proxy Re-encryption.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 3, p. 1449, doi. 10.1007/s11277-015-2292-7
- By:
- Publication type:
- Article
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1401, doi. 10.1007/s11277-014-1936-3
- By:
- Publication type:
- Article
High Definition Image Encryption Algorithm Based on AES Modification.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 811, doi. 10.1007/s11277-014-1888-7
- By:
- Publication type:
- Article
Multipartite Secret Sharing Based on CRT.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 1, p. 271, doi. 10.1007/s11277-014-1751-x
- By:
- Publication type:
- Article
Security and Privacy Analysis of Tree-LSHB+ Protocol.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 3125, doi. 10.1007/s11277-014-1699-x
- By:
- Publication type:
- Article
Performance Evaluation of Cost-Effective Multicast-Unicast Key Management Method.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 3, p. 2195, doi. 10.1007/s11277-014-1633-2
- By:
- Publication type:
- Article
Analysis of Acceleration Effect in Data Dissemination in Vehicular Networks Using Rateless Codes.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 991, doi. 10.1007/s11277-013-1548-3
- By:
- Publication type:
- Article
A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 979, doi. 10.1007/s11277-013-1547-4
- By:
- Publication type:
- Article
Notes on 'A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks'.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 907, doi. 10.1007/s11277-013-1543-8
- By:
- Publication type:
- Article
High Performance Group Merging/Splitting Scheme for Group Key Management.
- Published in:
- Wireless Personal Communications, 2014, v. 75, n. 2, p. 1529, doi. 10.1007/s11277-013-1436-x
- By:
- Publication type:
- Article
SECURE FILES STORAGE IN CLOUD USING HYBRID CRYPTOGRAPHY.
- Published in:
- i-Manager's Journal On Cloud Computing, 2020, v. 7, n. 2, p. 8, doi. 10.26634/jcc.7.2.18291
- By:
- Publication type:
- Article
Memristors for Hardware Security Applications.
- Published in:
- Advanced Electronic Materials, 2019, v. 5, n. 9, p. N.PAG, doi. 10.1002/aelm.201800872
- By:
- Publication type:
- Article
Innovative use of Noise Images for File Encryption and Honeywords within a Cloud-based Environment.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4260
- By:
- Publication type:
- Article
Review: Big Data Storage and Privacy in Cloud Environment by using Triple Data Encryption Standard.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 3093
- By:
- Publication type:
- Article
Composite Cryptographic Methodologies for Data Transmission Model using Modified Vigenère and Extended Polybius Cipher.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 358
- By:
- Publication type:
- Article
Scalable Multiparty Searchable Encryption Scheme for Searching and Encrypting Data in Cloud Environment.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 187
- By:
- Publication type:
- Article
Analysis of Cryptography Algorithms Implemented in Android Mobile Application.
- Published in:
- Information Technology & Control, 2021, v. 50, n. 4, p. 786, doi. 10.5755/j01.itc.50.4.29464
- By:
- Publication type:
- Article
Accelerating DES and AES Algorithms for a Heterogeneous Many-core Processor.
- Published in:
- International Journal of Parallel Programming, 2021, v. 49, n. 3, p. 463, doi. 10.1007/s10766-021-00692-4
- By:
- Publication type:
- Article
Triple DES: Privacy Preserving in Big Data Healthcare.
- Published in:
- International Journal of Parallel Programming, 2020, v. 48, n. 3, p. 515, doi. 10.1007/s10766-018-0592-8
- By:
- Publication type:
- Article
A Parallel Yet Pipelined Architecture for Efficient Implementation of the Advanced Encryption Standard Algorithm on Reconfigurable Hardware.
- Published in:
- International Journal of Parallel Programming, 2016, v. 44, n. 6, p. 1102, doi. 10.1007/s10766-016-0408-7
- By:
- Publication type:
- Article
Audio Steganography Using Least Significant Bit and AES Cryptographic Algorithm.
- Published in:
- ESTEEM, 2018, v. 14, p. 66
- By:
- Publication type:
- Article
一种多通道 2. 4 GHz 有源射频识别系统设计.
- Published in:
- Telecommunication Engineering, 2021, v. 61, n. 9, p. 1102, doi. 10.3969/j.issn.1001-893x.2021.09.007
- By:
- Publication type:
- Article
A new color image encryption algorithm based on dual scrambling about pixel position scrambling and RGB intensity value.
- Published in:
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 61, doi. 10.3969/j.issn.2095-476X.2014.06.014
- By:
- Publication type:
- Article
Secure Storage Method of Ship Communication Data Based on Double Key and Hadoop.
- Published in:
- Journal of Coastal Research, 2020, v. 103, p. 952, doi. 10.2112/SI103-198.1
- By:
- Publication type:
- Article
Performance testing on Transparent Data Encryption for SQL Server's reliability and efficiency.
- Published in:
- Journal of Big Data, 2021, v. 8, n. 1, p. 1, doi. 10.1186/s40537-021-00520-z
- By:
- Publication type:
- Article
МЕТОД ПРОВЕДЕННЯ ГОЛОСУВАННЯ СЕРЕД ВЛАСНИКІВ АКЦІЙ НА БЛОКЧЕЙНІ, ВИКОРИСТОВУЮЧИ КРИПТОСИСТЕМУ ПЕЙЕ ТА РОЗПОДІЛЕНУ ГЕНЕРАЦІЮ КЛЮЧІВ
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 2, p. 82, doi. 10.18372/2225-5036.25.13839
- By:
- Publication type:
- Article
SYNTHESIS OF СRYPTORESISTANT GENERATORS OF PSEUDORANDOM NUMBERS BASED ON GENERALIZED GALOIS AND FIBONACCI MATRIXES.
- Published in:
- Radio Electronics, Computer Science, Control, 2019, n. 3, p. 86, doi. 10.15588/1607-3274-2019-3-10
- By:
- Publication type:
- Article
ЗАПЕРЕЧУВАНЕ ШИФРУВАННЯ НА ОСНОВІ ЗАСТОСУВАННЯ ПІДХОДУ ГІБРИДНИХ КРИПТОГРАФІЧНИХ СИСТЕМ
- Published in:
- Radio Electronics, Computer Science, Control, 2019, n. 1, p. 178, doi. 10.15588/1607-3274-2019-1-17
- By:
- Publication type:
- Article
Lightweight Dynamic Crypto Algorithm for Next Internet Generation.
- Published in:
- Engineering, Technology & Applied Science Research, 2019, v. 9, n. 3, p. 4203, doi. 10.48084/etasr.2743
- By:
- Publication type:
- Article
On Circulant-Like Rhotrices over Finite Fields.
- Published in:
- Applications & Applied Mathematics, 2017, v. 12, n. 1, p. 506
- By:
- Publication type:
- Article
Secure Sharing of Patient Controlled e-Health Record using an Enhanced Access Control Model with Encryption Based on User Identity.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1267, doi. 10.14569/ijacsa.2024.01503124
- By:
- Publication type:
- Article
Image Binary Matrix Processing to Encrypt-Decrypt Digital Images.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1229, doi. 10.14569/ijacsa.2024.01503121
- By:
- Publication type:
- Article
Blockchain-based privacy preservation framework for healthcare data in cloud environment.
- Published in:
- Journal of Experimental & Theoretical Artificial Intelligence, 2024, v. 36, n. 1, p. 147, doi. 10.1080/0952813X.2022.2135611
- By:
- Publication type:
- Article
Secure Healthcare Monitoring and Attack Detection Framework using ELUS-BILSTM and STECAES.
- Published in:
- International Journal of Next-Generation Computing, 2024, v. 15, n. 3, p. 209
- By:
- Publication type:
- Article
An extensive review on IoT security challenges and LWC implementation on tiny hardware for node level security evaluation.
- Published in:
- International Journal of Next-Generation Computing, 2022, v. 13, n. 1, p. 28
- By:
- Publication type:
- Article
An extensive review on IoT security challenges and LWC implementation on tiny hardware for node level security evaluation.
- Published in:
- International Journal of Next-Generation Computing, 2022, p. 28, doi. 10.47164/ijngc.v13i1.424
- By:
- Publication type:
- Article