Works matching DE "ENCRYPTION protocols"
Results: 699
Fine-Grained Encrypted Traffic Classification Using Dual Embedding and Graph Neural Networks.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 778, doi. 10.3390/electronics14040778
- By:
- Publication type:
- Article
Efficient and Secure Long-Distance Quantum Key Distribution by using a Proxy Encryption Scheme.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 34, p. 80285, doi. 10.1007/s11042-024-18835-3
- By:
- Publication type:
- Article
Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 29, p. 72789, doi. 10.1007/s11042-024-18620-2
- By:
- Publication type:
- Article
Image encryption using a standard map and a teaching-learning based optimization algorithm.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 19, p. 29199, doi. 10.1007/s11042-023-14379-0
- By:
- Publication type:
- Article
A GRU and chaos-based novel image encryption approach for transport images.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 12, p. 18381, doi. 10.1007/s11042-022-13902-z
- By:
- Publication type:
- Article
4D Hyperchaotic map and DNA encoding combined image encryption for secure communication.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 11, p. 15859, doi. 10.1007/s11042-022-12598-5
- By:
- Publication type:
- Article
A novel method for mobile application recognition in encrypted channels.
- Published in:
- Electronic Research Archive, 2024, v. 32, n. 1, p. 1, doi. 10.3934/era.2024010
- By:
- Publication type:
- Article
Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties: By Ksenia Ermoshina and Francesca Musiani, Manchester, UK: Mattering Press, 2022, 272 pp., ISBN 9781912729227, £16.00.
- Published in:
- 2024
- By:
- Publication type:
- Book Review
"Standardising by running code": the Signal protocol and de facto standardisation in end-to-end encrypted messaging.
- Published in:
- Internet Histories, 2019, v. 3, n. 3/4, p. 343, doi. 10.1080/24701475.2019.1654697
- By:
- Publication type:
- Article
A new classification method for encrypted internet traffic using machine learning.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2021, v. 29, n. 5, p. 2450, doi. 10.3906/elk-2011-31
- By:
- Publication type:
- Article
Verifiable dynamic searchable encryption.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2019, v. 27, n. 4, p. 2606, doi. 10.3906/elk-1901-157
- By:
- Publication type:
- Article
5*‡;48( ‡(636* );‡(:.
- Published in:
- ISSA Journal, 2022, v. 20, n. 4, p. 10
- By:
- Publication type:
- Article
Where Do You Buy Your Crypto?
- Published in:
- ISSA Journal, 2020, v. 18, n. 5, p. 7
- By:
- Publication type:
- Article
Expect Compromised Hardware and Software.
- Published in:
- ISSA Journal, 2018, v. 16, n. 11, p. 9
- By:
- Publication type:
- Article
The Failure of Compliance.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 8
- By:
- Publication type:
- Article
S/MIME Certificate Management through DNS DANE: A NEW APPROACH.
- Published in:
- ISSA Journal, 2018, v. 16, n. 6, p. 20
- By:
- Publication type:
- Article
Encryption Standards.
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 14
- By:
- Publication type:
- Article
To Encrypt, or to Backdoor?
- Published in:
- ISSA Journal, 2016, v. 14, n. 6, p. 6
- By:
- Publication type:
- Article
Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 13, p. 1936, doi. 10.3390/math12131936
- By:
- Publication type:
- Article
On the Cryptanalysis of a Simplified AES Using a Hybrid Binary Grey Wolf Optimization.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3982, doi. 10.3390/math11183982
- By:
- Publication type:
- Article
A New Simple Chaotic System with One Nonlinear Term.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 22, p. 4374, doi. 10.3390/math10224374
- By:
- Publication type:
- Article
SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 12, p. 2120, doi. 10.3390/math10122120
- By:
- Publication type:
- Article
Modified SHARK Cipher and Duffing Map-Based Cryptosystem.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 12, p. 2034, doi. 10.3390/math10122034
- By:
- Publication type:
- Article
一种多通道 2. 4 GHz 有源射频识别系统设计.
- Published in:
- Telecommunication Engineering, 2021, v. 61, n. 9, p. 1102, doi. 10.3969/j.issn.1001-893x.2021.09.007
- By:
- Publication type:
- Article
APPLICATION OF DIFFERENTIAL CRYPTOGRAPHY TO A GN AUTHENTICATION HIERARCHY SCHEME.
- Published in:
- Electronic Journal of Differential Equations, 2017, v. 2017, n. 1-54, p. 1
- By:
- Publication type:
- Article
SYNTHESIS OF СRYPTORESISTANT GENERATORS OF PSEUDORANDOM NUMBERS BASED ON GENERALIZED GALOIS AND FIBONACCI MATRIXES.
- Published in:
- Radio Electronics, Computer Science, Control, 2019, n. 3, p. 86, doi. 10.15588/1607-3274-2019-3-10
- By:
- Publication type:
- Article
ЗАПЕРЕЧУВАНЕ ШИФРУВАННЯ НА ОСНОВІ ЗАСТОСУВАННЯ ПІДХОДУ ГІБРИДНИХ КРИПТОГРАФІЧНИХ СИСТЕМ
- Published in:
- Radio Electronics, Computer Science, Control, 2019, n. 1, p. 178, doi. 10.15588/1607-3274-2019-1-17
- By:
- Publication type:
- Article
Certificateless Public Key Encryption (CL-PKE) Scheme Using Extended Chebyshev Polynomial over the Finite Field Z<sub>p</sub>.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2015, v. 9, p. 53
- By:
- Publication type:
- Article
Low-Complexity and Secure Clustering-Based Similarity Detection for Private Files.
- Published in:
- TEM Journal, 2024, v. 13, n. 3, p. 2341, doi. 10.18421/TEM133-61
- By:
- Publication type:
- Article
Integrating meta-heuristic with named data networking for secure edge computing in IoT enabled healthcare monitoring system.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-71506-z
- By:
- Publication type:
- Article
PROTECȚIA DREPTULUI DE AUTOR PRIN MIJLOACE TEHNICE: CRIPTAREA.
- Published in:
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2016, n. 4, p. 148
- By:
- Publication type:
- Article
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks.
- Published in:
- Future Internet, 2025, v. 17, n. 1, p. 43, doi. 10.3390/fi17010043
- By:
- Publication type:
- Article
A Multidimensional Analysis of Released COVID-19 Location-Based Mobile Applications.
- Published in:
- Future Internet, 2021, v. 13, n. 11, p. 268, doi. 10.3390/fi13110268
- By:
- Publication type:
- Article
A Tiered Control Plane Model for Service Function Chaining Isolation.
- Published in:
- Future Internet, 2018, v. 10, n. 6, p. 46, doi. 10.3390/fi10060046
- By:
- Publication type:
- Article
Security Enhancement for Data Migration in the Cloud.
- Published in:
- Future Internet, 2017, v. 9, n. 3, p. 23, doi. 10.3390/fi9030023
- By:
- Publication type:
- Article
IMPLEMENTACIJA STEGANOGRAFIJE I KRIPTOGRAFSKIH ALGORITAMA U MATLAB-U.
- Published in:
- InfoM, 2023, n. 77, p. 4
- By:
- Publication type:
- Article
Asymmetric Cryptography Based on the Tropical Jones Matrix.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 4, p. 456, doi. 10.3390/sym16040456
- By:
- Publication type:
- Article
Light and Secure Encryption Technique Based on Artificially Induced Chaos and Nature-Inspired Triggering Method.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 2, p. N.PAG, doi. 10.3390/sym14020218
- By:
- Publication type:
- Article
Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 10, p. 1912, doi. 10.3390/sym13101912
- By:
- Publication type:
- Article
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 6, p. 1072, doi. 10.3390/sym13061072
- By:
- Publication type:
- Article
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 6, p. 969, doi. 10.3390/sym12060969
- By:
- Publication type:
- Article
Symmetric Key Encryption Based on Rotation-Translation Equation.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 1, p. 73, doi. 10.3390/sym12010073
- By:
- Publication type:
- Article
Algebraic Properties of the Block Cipher DESL.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 11, p. 1411, doi. 10.3390/sym11111411
- By:
- Publication type:
- Article
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 7, p. 913, doi. 10.3390/sym11070913
- By:
- Publication type:
- Article
Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 9, p. 399, doi. 10.3390/sym10090399
- By:
- Publication type:
- Article
Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 8, p. 340, doi. 10.3390/sym10080340
- By:
- Publication type:
- Article
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 105, doi. 10.3390/sym7010105
- By:
- Publication type:
- Article
Modified Advanced Feedback Encryption Standard Version-1 (MAFES-1).
- Published in:
- Journal of Information Assurance & Security, 2014, v. 9, n. 6, p. 244
- By:
- Publication type:
- Article
Algorithms for Construction of Multivariate Quadratic Quasigroups (MQQs) and Their Parastrophe Operations in Arbitrary Galois Fields.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 3, p. 164
- By:
- Publication type:
- Article
A Unified Model for Security, Trust and Privacy (STP) of RFID System.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 3, p. 119
- By:
- Publication type:
- Article