Works matching Data encryption
Results: 5000
A Newly Established Symmetric Key Encryption Algorithm for Small Amount of Data.
- Published in:
- IUP Journal of Information Technology, 2012, v. 8, n. 4, p. 60
- By:
- Publication type:
- Article
Dendritic Quaternary‐Encoded Oligourethanes for Data Encryption.
- Published in:
- Angewandte Chemie, 2023, v. 135, n. 3, p. 1, doi. 10.1002/ange.202214695
- By:
- Publication type:
- Article
Efficient sensitivity orient blockchain encryption for improved data security in cloud.
- Published in:
- Concurrent Engineering: Research & Applications, 2021, v. 29, n. 3, p. 249, doi. 10.1177/1063293X211008586
- By:
- Publication type:
- Article
The Thinnest Light Disk: Rewritable Data Storage and Encryption on WS<sub>2</sub> Monolayers (Adv. Funct. Mater. 36/2021).
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 36, p. 1, doi. 10.1002/adfm.202103140
- By:
- Publication type:
- Article
Data Encryption Strategy in Cloud Computing with Malware Detection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4032
- By:
- Publication type:
- Article
Review: Big Data Storage and Privacy in Cloud Environment by using Triple Data Encryption Standard.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 3093
- By:
- Publication type:
- Article
Security-Enhanced 3D Data Encryption Using a Degradable pH-Responsive Hydrogel.
- Published in:
- Nanomaterials (2079-4991), 2021, v. 11, n. 7, p. 1744, doi. 10.3390/nano11071744
- By:
- Publication type:
- Article
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 6, p. 6496, doi. 10.11591/ijece.v12i6.pp6496-6505
- By:
- Publication type:
- Article
High Throughput FPGA Implementation of Data Encryption Standard with Time Variable Sub-Keys.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2016, v. 6, n. 1, p. 298, doi. 10.11591/ijece.v6i1.8388
- By:
- Publication type:
- Article
Cryptanalytic Attacks on International Data Encryption Algorithm Block Cipher.
- Published in:
- Defence Science Journal, 2016, v. 66, n. 6, p. 582, doi. 10.14429/dsj.66.10798
- By:
- Publication type:
- Article
Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm.
- Published in:
- Wireless Personal Communications, 2021, v. 120, n. 3, p. 2427, doi. 10.1007/s11277-021-08562-5
- By:
- Publication type:
- Article
A Novel High-Speed Data Encryption Scheme for Internet of Medical Things Using Modified Elliptic Curve Diffie–Hellman and Advance Encryption Standard.
- Published in:
- International Journal of Image & Graphics, 2024, v. 24, n. 5, p. 1, doi. 10.1142/S0219467823400041
- By:
- Publication type:
- Article
Performance testing on Transparent Data Encryption for SQL Server's reliability and efficiency.
- Published in:
- Journal of Big Data, 2021, v. 8, n. 1, p. 1, doi. 10.1186/s40537-021-00520-z
- By:
- Publication type:
- Article
Data Encryption Method Using Environmental Secret Key with Server Assistance.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 423, doi. 10.1080/10798587.2015.1121615
- By:
- Publication type:
- Article
Biomaterial/Organic Heterojunction Based Memristor for Logic Gate Circuit Design, Data Encryption, and Image Reconstruction.
- Published in:
- Advanced Functional Materials, 2024, v. 34, n. 36, p. 1, doi. 10.1002/adfm.202401132
- By:
- Publication type:
- Article
Electret Molecular Configuration Induced Programmable Photonic Memory for Advanced Logic Operation and Data Encryption.
- Published in:
- Advanced Functional Materials, 2023, v. 33, n. 28, p. 1, doi. 10.1002/adfm.202213341
- By:
- Publication type:
- Article
A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 16, p. 16963, doi. 10.1007/s11042-016-3662-1
- By:
- Publication type:
- Article
A quantitative study on the usage of a cryptographic software tool for data and communications encryption.
- Published in:
- Issues in Information Systems, 2023, v. 24, n. 2, p. 12, doi. 10.48009/2_iis_2023_102
- By:
- Publication type:
- Article
Data encryption algorithm for e-commerce platform based on blockchain technology.
- Published in:
- Discrete & Continuous Dynamical Systems - Series S, 2019, v. 12, n. 4/5, p. 1457, doi. 10.3934/dcdss.2019100
- By:
- Publication type:
- Article
A high precision data encryption algorithm in wireless network mobile communication.
- Published in:
- Discrete & Continuous Dynamical Systems - Series S, 2019, v. 12, n. 4/5, p. 1327, doi. 10.3934/dcdss.2019091
- By:
- Publication type:
- Article
Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 4, p. 565, doi. 10.1002/sec.1003
- By:
- Publication type:
- Article
Accounting data encryption processing based on virtual reality and multimedia technology in medical sector.
- Published in:
- Journal of Commercial Biotechnology, 2023, v. 28, n. 2, p. 27, doi. 10.5912/jcb1394
- By:
- Publication type:
- Article
Intelligent Chimp Metaheuristics Optimization with Data Encryption Protocol for WSN.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 32, n. 1, p. 573, doi. 10.32604/iasc.2022.020969
- By:
- Publication type:
- Article
利用哈尔变换和高斯随机数进行矢量空间数据 坐标加密.
- Published in:
- Geomatics & Information Science of Wuhan University, 2022, v. 47, n. 11, p. 1946, doi. 10.13203/j.whugis20200219
- By:
- Publication type:
- Article
Data Encryption Dispute Resolutions under Intermediary Guidelines of Information Technology Act: Challenges and Future Framework.
- Published in:
- DESIDOC Journal of Library & Information Technology, 2022, v. 42, n. 3, p. 201, doi. 10.14429/djlit.42.3.17869
- By:
- Publication type:
- Article
Research on trade data encryption of tobacco enterprises based on adversarial neural network.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 16, p. 7501, doi. 10.1007/s00500-021-06479-6
- By:
- Publication type:
- Article
Security Protection of 3D Models of Oblique Photography by Digital Watermarking and Data Encryption.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 24, p. 13088, doi. 10.3390/app132413088
- By:
- Publication type:
- Article
Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation.
- Published in:
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00417-7
- By:
- Publication type:
- Article
New extension of data encryption standard over 128-bit key for digital images.
- Published in:
- Neural Computing & Applications, 2021, v. 33, n. 20, p. 13845, doi. 10.1007/s00521-021-06023-5
- By:
- Publication type:
- Article
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications.
- Published in:
- Computer Modeling in Engineering & Sciences (CMES), 2024, v. 140, n. 3, p. 2779, doi. 10.32604/cmes.2024.052124
- By:
- Publication type:
- Article
Joint compression and encryption of visual data using orthogonal parametric transforms.
- Published in:
- Bulletin of the Polish Academy of Sciences: Technical Sciences, 2016, v. 64, n. 2, p. 373, doi. 10.1515/bpasts-2016-0042
- By:
- Publication type:
- Article
Ultralong Organic Phosphorescence of Triazatruxene Derivatives for Dynamic Data Encryption and Anti‐counterfeiting.
- Published in:
- Chinese Journal of Chemistry, 2023, v. 41, n. 18, p. 2261, doi. 10.1002/cjoc.202300139
- By:
- Publication type:
- Article
Analytical Approach for Data Encryption Standard Algorithm.
- Published in:
- International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 14, p. 126, doi. 10.3991/ijim.v17i14.38641
- By:
- Publication type:
- Article
Sensors data encryption using TSFS Algorithm.
- Published in:
- Journal of Madenat Al-Elem University College / Magallaẗ Kulliyyaẗ Madīnaẗ Al-ʿAlam Al-Ğāmi'aẗ, 2018, v. 10, n. 1, p. 32
- By:
- Publication type:
- Article
INTERFACE CONTROL AND STATUS MONITORING OF ELECTRONIC INFORMATION EQUIPMENT BASED ON NONLINEAR DATA ENCRYPTION.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 2, p. 751, doi. 10.12694/scpe.v25i2.2521
- By:
- Publication type:
- Article
The Thinnest Light Disk: Rewritable Data Storage and Encryption on WS<sub>2</sub> Monolayers.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 36, p. 1, doi. 10.1002/adfm.202103140
- By:
- Publication type:
- Article
Data Encryption Security in Mobile and Cloud Computing Environments.
- Published in:
- Journal of Applied Information Science, 2019, v. 7, n. 2, p. 19
- By:
- Publication type:
- Article
Breaking the data encryption standard using networks of evolutionary processors with parallel string rewriting rules.
- Published in:
- International Journal of Computer Mathematics, 2009, v. 86, n. 4, p. 567, doi. 10.1080/00207160701351168
- By:
- Publication type:
- Article
High-Speed Video Data Encryption on LTE-Based Swarm UAS.
- Published in:
- International Review of Aerospace Engineering, 2018, v. 11, n. 5, p. 186, doi. 10.15866/irease.v11i5.15180
- By:
- Publication type:
- Article
Network Information Security Data Protection Based on Data Encryption Technology.
- Published in:
- Wireless Personal Communications, 2022, v. 126, n. 3, p. 2719, doi. 10.1007/s11277-022-09838-0
- By:
- Publication type:
- Article
Secure Electronic Voting Machine using Multi-Modal Biometric Authentication System, Data Encryption, and Firewall.
- Published in:
- International Journal of Performability Engineering, 2019, n. 10, p. 2570, doi. 10.23940/ijpe.19.10.p2.25702577
- By:
- Publication type:
- Article
Monitoring data encryption method for howitzer shell transfer arm using chaos and compressive sensing.
- Published in:
- Journal of Algorithms & Computational Technology, 2019, v. 13, p. N.PAG, doi. 10.1177/1748302619873598
- By:
- Publication type:
- Article
Optimized Adaboost Support Vector Machine-Based Encryption for Securing IoT-Cloud Healthcare Data.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 3, p. 731, doi. 10.3390/s25030731
- By:
- Publication type:
- Article
Enhancing Security in Digital Data using various Function of S-box in Data Encryption Standard Method.
- Published in:
- Webology, 2021, v. 18, n. 2, p. 767, doi. 10.14704/WEB/V18I2/WEB18353
- By:
- Publication type:
- Article
Hide Text within a Video Using Data Encryption Standard (DES) Technology.
- Published in:
- SAR Journal (2619-9955), 2024, v. 7, n. 1, p. 24, doi. 10.18421/SAR71-04
- By:
- Publication type:
- Article
SECRET KEY BASED STRING REVERSE ENABLING USER LEVEL ENCRYPTION TECHNIQUE FOR DATA SECURITY.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 612, doi. 10.26483/ijarcs.v9i2.5883
- By:
- Publication type:
- Article
Strange Number System: An Enhancing Tool for Data Encryption and Decryption.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 2, p. 167
- By:
- Publication type:
- Article
Secure Data Encryption Through a Combination of AES, RSA and HMAC.
- Published in:
- Engineering, Technology & Applied Science Research, 2017, v. 7, n. 4, p. 1781, doi. 10.48084/etasr.1272
- By:
- Publication type:
- Article
Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN.
- Published in:
- Journal of Circuits, Systems & Computers, 2022, v. 31, n. 17, p. 1, doi. 10.1142/S0218126622503030
- By:
- Publication type:
- Article
ENHANCE THE DATA SECURITY BY CHANGINGTHE ENCRYPTION TECHNIQUE BASED ON DATA PATTERN IN BLOCK BASED PRIVATE KEY DATA ENCRYPTION.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 439, doi. 10.26483/ijarcs.v8i7.4278
- By:
- Publication type:
- Article