Works matching Encryption
Results: 5000
基于四维混沌系统的改进AES图像加密算法.
- Published in:
- Systems Engineering & Electronics, 2023, v. 45, n. 12, p. 4040, doi. 10.12305/j.issn.1001-506X.2023.12.35
- By:
- Publication type:
- Article
基于交替量子随机行走的改进 AES 和离散余弦 变换的图像加密算法.
- Published in:
- Journal of Beijing University of Technology, 2023, v. 49, n. 6, p. 647, doi. 10.11936/bjutxb2022080021
- By:
- Publication type:
- Article
A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic.
- Published in:
- Wireless Personal Communications, 2019, v. 109, n. 2, p. 849, doi. 10.1007/s11277-019-06594-6
- By:
- Publication type:
- Article
Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms.
- Published in:
- Mobile Networks & Applications, 2023, v. 28, n. 4, p. 1385, doi. 10.1007/s11036-018-1058-3
- By:
- Publication type:
- Article
Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 9, p. 1540, doi. 10.3390/app8091540
- By:
- Publication type:
- Article
An image encryption based on Fibonacci sequence and fusion of advanced encryption standard-least significant bit method.
- Published in:
- Telkomnika, 2024, v. 22, n. 6, p. 1517, doi. 10.12928/TELKOMNIKA.v22i6.26078
- By:
- Publication type:
- Article
An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum Walk and Advanced Encryption Standard.
- Published in:
- Entropy, 2022, v. 24, n. 5, p. N.PAG, doi. 10.3390/e24050608
- By:
- Publication type:
- Article
Satellite image encryption using 2D standard map and advanced encryption standard with scrambling.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5153, doi. 10.11591/ijece.v14i5.pp5153-5171
- By:
- Publication type:
- Article
Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system.
- Published in:
- Optica Applicata, 2019, v. 49, n. 4, p. 545, doi. 10.37190/oa190402
- By:
- Publication type:
- Article
Medical Image Encryption Using Modified Identity Based Encryption.
- Published in:
- EMITTER International Journal of Engineering Technology, 2019, v. 7, n. 2, p. 524, doi. 10.24003/emitter.v7i2.405
- By:
- Publication type:
- Article
Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations.
- Published in:
- International Journal of Pure & Applied Sciences & Technology, 2015, v. 27, n. 1, p. 1
- By:
- Publication type:
- Article
A Novel High-Speed Data Encryption Scheme for Internet of Medical Things Using Modified Elliptic Curve Diffie–Hellman and Advance Encryption Standard.
- Published in:
- International Journal of Image & Graphics, 2024, v. 24, n. 5, p. 1, doi. 10.1142/S0219467823400041
- By:
- Publication type:
- Article
واجهة تخطيطية ملحاكاة خوارزمية التشفير DES-S.
- Published in:
- Al-Andalus Journal for Applied Sciences, 2024, v. 10, n. 17, p. 7
- By:
- Publication type:
- Article
Efficient HEVC selective stream encryption using chaotic logistic map.
- Published in:
- Multimedia Systems, 2018, v. 24, n. 4, p. 419, doi. 10.1007/s00530-017-0568-3
- By:
- Publication type:
- Article
A Noisy Channel Tolerant Image Encryption Scheme.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2771, doi. 10.1007/s11277-014-1667-5
- By:
- Publication type:
- Article
Innovative use of Noise Images for File Encryption and Honeywords within a Cloud-based Environment.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4260
- By:
- Publication type:
- Article
Scalable Multiparty Searchable Encryption Scheme for Searching and Encrypting Data in Cloud Environment.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 187
- By:
- Publication type:
- Article
ЗАПЕРЕЧУВАНЕ ШИФРУВАННЯ НА ОСНОВІ ЗАСТОСУВАННЯ ПІДХОДУ ГІБРИДНИХ КРИПТОГРАФІЧНИХ СИСТЕМ
- Published in:
- Radio Electronics, Computer Science, Control, 2019, n. 1, p. 178, doi. 10.15588/1607-3274-2019-1-17
- By:
- Publication type:
- Article
A HIVE STREAM ENCRYPTION (HSE): A NEW STREAM ENCRYPTION ALGORITHM.
- Published in:
- Journal of Information System Security, 2018, v. 14, n. 2, p. 65
- By:
- Publication type:
- Article
A HIVE STREAM ENCRYPTION (HSE): A NEW STREAM ENCRYPTION ALGORITHM.
- Published in:
- Journal of Information System Security, 2018, v. 14, n. 2, p. 65
- By:
- Publication type:
- Article
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 3, p. 1, doi. 10.1177/1550147720914779
- By:
- Publication type:
- Article
Chaotic Medical Image Encryption Algorithm Based on Bit-Plane Decomposition.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2016, v. 30, n. 4, p. -1, doi. 10.1142/S0218001416570019
- By:
- Publication type:
- Article
Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms.
- Published in:
- EAI Endorsed Transactions on Scalable Information Systems, 2020, v. 7, n. 28, p. 1, doi. 10.4108/eai.13-7-2018.164555
- By:
- Publication type:
- Article
Algoritmo internacional de cifrado de datos (IDEA) que utiliza la variante de cifrado SHA-256.
- Published in:
- Revista Vínculos, 2022, v. 19, n. 2, p. 1
- By:
- Publication type:
- Article
Design of High-Secure Digital/Optical Double Color Image Encryption Assisted by 9D Chaos and DnCNN.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2024, v. 20, n. 2, p. 165, doi. 10.37917/ijeee.20.2.14
- By:
- Publication type:
- Article
Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination.
- Published in:
- Computers, Materials & Continua, 2023, v. 76, n. 3, p. 3325, doi. 10.32604/cmc.2023.041167
- By:
- Publication type:
- Article
Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm.
- Published in:
- International Journal of Online & Biomedical Engineering, 2023, v. 19, n. 3, p. 99, doi. 10.3991/ijoe.v19i03.37569
- By:
- Publication type:
- Article
Optimization of Encryption Algorithm for Administrative Examination and Approval Data.
- Published in:
- Metallurgical & Mining Industry, 2015, n. 8, p. 361
- By:
- Publication type:
- Article
An observer‐based exponential synchronization scheme for chaotic systems: Using advanced encryption standard as auxiliary.
- Published in:
- Asian Journal of Control, 2020, v. 22, n. 6, p. 2183, doi. 10.1002/asjc.2293
- By:
- Publication type:
- Article
DR-PRE: dual receiver proxy re-encryption scheme.
- Published in:
- Information Security Journal: A Global Perspective, 2020, v. 29, n. 2, p. 62, doi. 10.1080/19393555.2020.1715515
- By:
- Publication type:
- Article
Bit-oriented quantum public-key encryption based on quantum perfect encryption.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 8, p. 3285, doi. 10.1007/s11128-016-1339-3
- By:
- Publication type:
- Article
A Modified Advanced Encryption Standard for Color Images.
- Published in:
- Iraqi Journal of Science, 2022, v. 63, n. 1, p. 294, doi. 10.24996/ijs.2022.63.1.29
- By:
- Publication type:
- Article
R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption.
- Published in:
- Data Science & Engineering, 2020, v. 5, n. 4, p. 391, doi. 10.1007/s41019-020-00136-y
- By:
- Publication type:
- Article
Hybrid Searchable Encryption Scheme for Data Security in Cloud.
- Published in:
- International Journal of Distributed & Cloud Computing, 2020, v. 8, n. 1/2, p. 9
- By:
- Publication type:
- Article
Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 13, p. 1936, doi. 10.3390/math12131936
- By:
- Publication type:
- Article
Time-specific encryption from forward-secure encryption: generic and direct constructions.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 5, p. 549, doi. 10.1007/s10207-015-0304-y
- By:
- Publication type:
- Article
New extension of data encryption standard over 128-bit key for digital images.
- Published in:
- Neural Computing & Applications, 2021, v. 33, n. 20, p. 13845, doi. 10.1007/s00521-021-06023-5
- By:
- Publication type:
- Article
Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.
- Published in:
- Entropy, 2023, v. 25, n. 11, p. 1478, doi. 10.3390/e25111478
- By:
- Publication type:
- Article
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms.
- Published in:
- 2022
- By:
- Publication type:
- Literature Review
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.
- Published in:
- Entropy, 2020, v. 22, n. 11, p. 1253, doi. 10.3390/e22111253
- By:
- Publication type:
- Article
Modified Advanced Encryption Standard for Boost Image Encryption.
- Published in:
- UHD Journal of Science & Technology, 2022, v. 6, n. 1, p. 52, doi. 10.21928/uhdjst.v6n1y2022.pp52-59
- By:
- Publication type:
- Article
Three-Dimensional Double Random-Phase Encryption for Simultaneous Two-Primary Data.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 5, p. 823, doi. 10.3390/electronics13050823
- By:
- Publication type:
- Article
Image Encryption Algorithm Combining Chaotic Image Encryption and Convolutional Neural Network.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 16, p. 3455, doi. 10.3390/electronics12163455
- By:
- Publication type:
- Article
Design and Implementation of Real-Time Image Acquisition Chip Based on Triple-Hybrid Encryption System.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 18, p. N.PAG, doi. 10.3390/electronics11182925
- By:
- Publication type:
- Article
JPEG Images Encryption Scheme Using Elliptic Curves and A New S-Box Generated by Chaos.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 4, p. 413, doi. 10.3390/electronics10040413
- By:
- Publication type:
- Article
Enhancing data security using a multi-layer encryption system.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2025, v. 15, n. 2, p. 1961, doi. 10.11591/ijece.v15i2.pp1961-1967
- By:
- Publication type:
- Article
Comparative study on satellite based image encryption methods: a survey.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 3, p. 2843, doi. 10.11591/ijece.v14i3.pp2843-2853
- By:
- Publication type:
- Article
Convolutional neural network based key generation for security of data through encryption with advanced encryption standard.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 3, p. 2589, doi. 10.11591/ijece.v13i3.pp2589-2599
- By:
- Publication type:
- Article
Advanced approach for encryption using advanced encryption standard with chaotic map.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 2, p. 1708, doi. 10.11591/ijece.v13i2.pp1708-1723
- By:
- Publication type:
- Article
Word-based encryption algorithm using dictionary indexing with variable encryption key length.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 1, p. 669, doi. 10.11591/ijece.v12i1.pp669-683
- By:
- Publication type:
- Article