Works matching DE "DATA encryption"
Results: 5000
The impact of alternant codes over Eisenstein integers on modern technology: The impact of alternant codes over Eisenstein integers: M. Sajjad et al.
- Published in:
- Computational & Applied Mathematics, 2025, v. 44, n. 2, p. 1, doi. 10.1007/s40314-024-03057-y
- By:
- Publication type:
- Article
Homomorphic with Henon-Map Encryption over Medical Image Data Confidentiality in Cloud and Classifying Images Using Deep Learning Approaches in IoT.
- Published in:
- Traitement du Signal, 2025, v. 42, n. 1, p. 29, doi. 10.18280/ts.420104
- By:
- Publication type:
- Article
Adaptive and Scalable Cloud Data Sharing Framework with Quantum-Resistant Security, Decentralized Auditing, and Machine Learning-Based Threat Detection.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 1042
- By:
- Publication type:
- Article
IoT CCTV Video Security Optimization Using Selective Encryption and Compression.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 262
- By:
- Publication type:
- Article
End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 3223, doi. 10.32604/cmc.2024.054676
- By:
- Publication type:
- Article
Integrated Dynamic Power Management Strategy with a Field Programmable Gate Array-Based Cryptoprocessor System for Secured Internet-of-Medical Things Networks.
- Published in:
- Technologies (2227-7080), 2025, v. 13, n. 2, p. 68, doi. 10.3390/technologies13020068
- By:
- Publication type:
- Article
DS-GAC: A Data-Sharing Scheme Based on Group Attribute Characteristics.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 702, doi. 10.3390/electronics14040702
- By:
- Publication type:
- Article
Biometric Data Encryption Using a New Five Dimensional Hyper-Chaotic System.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 43, doi. 10.18280/ijsse.150105
- By:
- Publication type:
- Article
Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems.
- Published in:
- PLoS ONE, 2025, v. 20, n. 2, p. 1, doi. 10.1371/journal.pone.0318110
- By:
- Publication type:
- Article
Permutation Steganography for Polygonal Meshes Based on Coding Tree.
- Published in:
- International Journal of Virtual Reality, 2010, v. 9, n. 4, p. 55, doi. 10.20870/ijvr.2010.9.4.2790
- By:
- Publication type:
- Article
On Jargon: Randomness in Cryptography.
- Published in:
- UMAP Journal, 2018, v. 39, n. 1, p. 69
- By:
- Publication type:
- Article
SHAREHOLDER PROPOSALS AND THE LIMITS OF ENCRYPTED INTERPRETATIONS.
- Published in:
- Villanova Law Review, 2018, v. 63, n. 1, p. 35
- By:
- Publication type:
- Article
UNIVERSALLY COMPOSABLE BLIND SIGNATURE FUNCTIONALITY.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 4, p. 673, doi. 10.1142/S0219622004001318
- By:
- Publication type:
- Article
New Efficient Timed Commitment Schemes.
- Published in:
- International Journal of Information Technology & Decision Making, 2003, v. 2, n. 2, p. 287, doi. 10.1142/S0219622003000616
- By:
- Publication type:
- Article
10 Minutes with a Quantum Cryptography Expert.
- Published in:
- 2010
- Publication type:
- Interview
Quantum Physics Helps Secure Data.
- Published in:
- Innovation, 2006, v. 6, n. 1, p. 72
- By:
- Publication type:
- Article
Enabling Stereochemical Communication and Stimuli‐Responsive Chiroptical Properties in Biphenyl‐Capped Cyclodextrins.
- Published in:
- Chemistry - A European Journal, 2023, v. 29, n. 65, p. 1, doi. 10.1002/chem.202302376
- By:
- Publication type:
- Article
Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.
- Published in:
- Angewandte Chemie, 2024, v. 136, n. 16, p. 1, doi. 10.1002/ange.202402349
- By:
- Publication type:
- Article
Disorder‐Enhanced Charge‐Transfer‐Mediated Room‐Temperature Phosphorescence in Polymer Media.
- Published in:
- Angewandte Chemie, 2023, v. 135, n. 45, p. 1, doi. 10.1002/ange.202312627
- By:
- Publication type:
- Article
Supercooled Liquids with Dynamic Room Temperature Phosphorescence Using Terminal Hydroxyl Engineering.
- Published in:
- Angewandte Chemie, 2023, v. 135, n. 24, p. 1, doi. 10.1002/ange.202301564
- By:
- Publication type:
- Article
ESIPT‐Inspired Dual‐Mode Photoswitches with Fast Molecular Isomerization in the Solid State.
- Published in:
- Angewandte Chemie, 2023, v. 135, n. 15, p. 1, doi. 10.1002/ange.202301765
- By:
- Publication type:
- Article
Dendritic Quaternary‐Encoded Oligourethanes for Data Encryption.
- Published in:
- Angewandte Chemie, 2023, v. 135, n. 3, p. 1, doi. 10.1002/ange.202214695
- By:
- Publication type:
- Article
Orthogonally Integrating Programmable Structural Color and Photo‐Rewritable Fluorescence in Hydrazone Photoswitch‐bonded Cholesteric Liquid Crystalline Network.
- Published in:
- Angewandte Chemie, 2022, v. 134, n. 50, p. 1, doi. 10.1002/ange.202213915
- By:
- Publication type:
- Article
Generation of Tunable Ultrastrong White‐Light Emission by Activation of a Solid Supramolecule through Bromonaphthylpyridinium Polymerization.
- Published in:
- Angewandte Chemie, 2022, v. 134, n. 44, p. 1, doi. 10.1002/ange.202213097
- By:
- Publication type:
- Article
Molecular Engineering through Control of Structural Deformation for Highly Efficient Ultralong Organic Phosphorescence.
- Published in:
- Angewandte Chemie, 2021, v. 133, n. 4, p. 2086, doi. 10.1002/ange.202011830
- By:
- Publication type:
- Article
Genomic Encryption of Digital Data Stored in Synthetic DNA.
- Published in:
- Angewandte Chemie, 2020, v. 132, n. 22, p. 8554, doi. 10.1002/ange.202001162
- By:
- Publication type:
- Article
Reversible Optical Writing and Data Storage in an Anthracene‐Loaded Metal–Organic Framework.
- Published in:
- Angewandte Chemie, 2019, v. 131, n. 8, p. 2445, doi. 10.1002/ange.201813996
- By:
- Publication type:
- Article
A novel technique of image encryption through projective coordinates of elliptic curve.
- Published in:
- Multimedia Tools & Applications, 2025, v. 84, n. 5, p. 2651, doi. 10.1007/s11042-024-19598-7
- By:
- Publication type:
- Article
A secure and energy-efficient edge computing improved SZ 2.1 hybrid algorithm for handling iot data stream.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 36, p. 83629, doi. 10.1007/s11042-024-18765-0
- By:
- Publication type:
- Article
Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 35, p. 82303, doi. 10.1007/s11042-024-18613-1
- By:
- Publication type:
- Article
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 19, p. 56569, doi. 10.1007/s11042-023-17571-4
- By:
- Publication type:
- Article
Feature extraction based pixel segmentation techniques data hiding and data encryption.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 19259, doi. 10.1007/s11042-023-16338-1
- By:
- Publication type:
- Article
The current state and future of mobile security in the light of the recent mobile security threat reports.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 13, p. 20269, doi. 10.1007/s11042-023-14400-6
- By:
- Publication type:
- Article
Secured two factor authentication, graph based replication and encryption strategy in cloud computing.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 16105, doi. 10.1007/s11042-022-13838-4
- By:
- Publication type:
- Article
An efficient steganography technique based on S<sup>2</sup>OA & DESAE model.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 10, p. 14527, doi. 10.1007/s11042-022-13798-9
- By:
- Publication type:
- Article
A novel dual-layer security scheme based on 3-cell cellular neural network encryption and data hiding scheme for color images.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 4, p. 6127, doi. 10.1007/s11042-022-13621-5
- By:
- Publication type:
- Article
A novel combination of information confidentiality and data hiding mechanism.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 5, p. 6917, doi. 10.1007/s11042-022-13623-3
- By:
- Publication type:
- Article
Crytographical primitive for blockchain: a secure random DNA encoded key generation technique.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 28, p. 40413, doi. 10.1007/s11042-022-13063-z
- By:
- Publication type:
- Article
A novel block encryption method based on Catalan random walks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 25, p. 36667, doi. 10.1007/s11042-021-11497-5
- By:
- Publication type:
- Article
Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 23, p. 33731, doi. 10.1007/s11042-022-12493-z
- By:
- Publication type:
- Article
Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 22, p. 33731, doi. 10.1007/s11042-022-12493-z
- By:
- Publication type:
- Article
An enhanced approach to improve the encryption of big data using intelligent classification technique.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 18, p. 25171, doi. 10.1007/s11042-022-12401-5
- By:
- Publication type:
- Article
AB-DAM: attribute-based data access model in blockchain for healthcare applications.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 17, p. 23567, doi. 10.1007/s11042-022-12674-w
- By:
- Publication type:
- Article
Blockchain based security framework for sharing digital images using reversible data hiding and encryption.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 17, p. 24721, doi. 10.1007/s11042-022-12617-5
- By:
- Publication type:
- Article
Pseudo random sequences based on elliptic curve subgroups and mathematical model for its application to digital image security.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 17, p. 23709, doi. 10.1007/s11042-022-12358-5
- By:
- Publication type:
- Article
Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 22065, doi. 10.1007/s11042-021-10817-z
- By:
- Publication type:
- Article
4D Hyperchaotic map and DNA encoding combined image encryption for secure communication.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 11, p. 15859, doi. 10.1007/s11042-022-12598-5
- By:
- Publication type:
- Article
A dual layer security scheme for medical images using Hessenberg and singular value decompositions.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14001, doi. 10.1007/s11042-022-12480-4
- By:
- Publication type:
- Article
Medical images lossless recovery based on POB number system and image compression.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 8, p. 11415, doi. 10.1007/s11042-022-12266-8
- By:
- Publication type:
- Article
Network data security sharing system based on blockchain.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 31887, doi. 10.1007/s11042-021-11183-6
- By:
- Publication type:
- Article