-
1Academic Journal
المؤلفون: Mingliang Sun, Jie Yuan, Xiaoyong Li, Dongxiao Liu, Xinghai Wei
المصدر: Entropy, Vol 26, Iss 12, p 1013 (2024)
مصطلحات موضوعية: VGG, image encrypt, S-box, single-connected layer, chaos, Science, Astrophysics, QB460-466, Physics, QC1-999
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Junfu Liu, Dekun Ma, Chenze Qi, Dongpeng Yang, Shaoming Huang
مصطلحات موضوعية: Biophysics, Biochemistry, Medicine, Cell Biology, Pharmacology, Biotechnology, Inorganic Chemistry, Infectious Diseases, Virology, Computational Biology, Space Science, Chemical Sciences not elsewhere classified, Physical Sciences not elsewhere classified, solvomechanochromic rhodamine b, nonclosely packed micro, encrypt photonic patterns, dependent color contrasts, combining click chemistry, pl peak position, maximal pl inhibition, mode modulating fluorescence, pl regulation, wireless sensors, unique compositions, structural colors, responsive nonclose, rational design, precisely adjusted, practical applications, potential applications
-
3Academic Journal
المصدر: Data Science: Journal of Computing and Applied Informatics; Vol. 8 No. 1 (2024): Data Science: Journal of Computing and Applied Informatics (JoCAI); 14 - 24 ; 2580-829X ; 2580-6769
مصطلحات موضوعية: Signcryption, Matrix Modification of RSA Digital Signature Scheme, Cayley-Purser Algorithm, Encrypt-then-Sign, Hash Function, MD5
وصف الملف: application/pdf
-
4Academic Journal
المؤلفون: Snehal Samanth, Prema K V, Mamatha Balachandra
المصدر: Cogent Engineering, Vol 10, Iss 1 (2023)
مصطلحات موضوعية: Decrypt, drone, encrypt, GCS, LEA-256, panorama, Engineering (General). Civil engineering (General), TA1-2040
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2331-1916
-
5Conference
المساهمون: Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography, NCER-FT - FinTech National Centre of Excellence in Research LU
المصدر: NIST Workshop on the Requirements for an Accordion Cipher Mode 2024, Rockville, United States [US], 20-21 June 2024
مصطلحات موضوعية: Hash-Encrypt-Hash, Accordion Mode, HCTR, ACCOR, Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
Relation: CryptoFin C22/IS/17415825; https://orbilu.uni.lu/handle/10993/62162; info:hdl:10993/62162
-
6Report
المؤلفون: Erotokritou, Stelios, Giannoulakis, Ioannis, Kafetzakis, Emmanouil, Kaltakis, Konstantinos
المصدر: IEEE International Conference on Cyber Security and Resilience, London, United Kingdom, 2-4 September, 2024
مصطلحات موضوعية: Differential Privacy, Data Security, ENCRYPT Project, Privacy-Preserving Technology, Data Accuracy, Automated Model Optimization, User-centric Privacy Solutions
Relation: https://zenodo.org/communities/encrypt-project; https://doi.org/10.5281/zenodo.13960366; https://doi.org/10.5281/zenodo.13960367; oai:zenodo.org:13960367
-
7Conference
المساهمون: Liu, Joseph, Xiang, Yang, Nepal, Surya
المصدر: ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
مصطلحات موضوعية: Security and privacy, Security protocols, Web application security, Cryptanalysis and other attacks, Telegram, Timing side-channel, Reply attack, Encrypt-and-MAC, info:eu-repo/classification/ddc/004, Data processing, computer science
وصف الملف: application/application/pdf
Relation: info:eu-repo/semantics/altIdentifier/wos/001053857900028; http://hdl.handle.net/20.500.11850/620789
-
8Academic Journal
المؤلفون: Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU
المصدر: Tongxin xuebao, Vol 43, Pp 156-170 (2022)
مصطلحات موضوعية: malicious encrypt traffic, machine learning, secure two-party computation, automatic confirmation, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
9Academic Journal
المؤلفون: Tamus Bin Tahir, Mochammad Apriyadi, Muh Rais, Irwan Syarif
المصدر: Patria Artha Technological Journal, Vol 4, Iss 1, Pp 41-46 (2020)
مصطلحات موضوعية: encrypt dan decrypt, aes, laravel, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
10Academic Journal
المؤلفون: Mark Kenneth C. Engcot
المصدر: International Journal of Recent Research in Mathematics Computer Science and Information Technology, 9(1), 28-33, (2022-08-08)
مصطلحات موضوعية: cryptography, linear Diophantine equation, encrypt, decrypt, encode, decode
-
11Academic Journal
المؤلفون: Nurdin, Alya Aulia, Djuniadi, Djuniadi
المصدر: Journal of Soft Computing Exploration; Vol. 3 No. 1 (2022): March 2022; 37-43 ; 2746-0991 ; 2746-7686 ; 10.52465/joscex.v3i1
وصف الملف: application/pdf
-
12Academic Journal
المؤلفون: Efendi, Muhammad, Volvo Sihombing, Parulian, Sahat
المصدر: Sinkron : jurnal dan penelitian teknik informatika; Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021; 243-247 ; 2541-2019 ; 2541-044X ; 10.33395/sinkron.v7i1
وصف الملف: application/pdf
-
13Academic Journal
المؤلفون: Dontha, Mahalsa Sai
المصدر: International Journal of Research in Engineering, Science and Management; Vol. 5 No. 8 (2022); 37-40 ; 2581-5792
مصطلحات موضوعية: AES, cryptography, DES, encrypt, security
وصف الملف: application/pdf
-
14Academic Journal
المؤلفون: Muhammad Efendi, Volvo Sihombing, Sahat Parulian
المصدر: Sinkron, Vol 7, Iss 1, Pp 243-247 (2022)
مصطلحات موضوعية: security, base64, encrypt, decrypt, ascii, Electronics, TK7800-8360, Electronic computers. Computer science, QA75.5-76.95
Relation: https://jurnal.polgan.ac.id/index.php/sinkron/article/view/11256; https://doaj.org/toc/2541-044X; https://doaj.org/toc/2541-2019; https://doaj.org/article/f8275e6ddbab4dada4878122bd63bdb5
-
15Conference
المؤلفون: Reshma S Ramesh, Meera Rose Mathew
المصدر: NCECA2021, National Conference on Emerging Computer Applications-2021, Kerala, 17 June 2021
مصطلحات موضوعية: fernet, fernet token, generate_key(), encrypt_data()
Relation: https://zenodo.org/communities/amaljyothi; https://doi.org/10.5281/zenodo.5094058; https://doi.org/10.5281/zenodo.5094059; oai:zenodo.org:5094059
-
16Academic Journal
المؤلفون: Kameran Ameen
المصدر: Kirkuk Journal of Science, Vol 13, Iss 4, Pp 17-33 (2018)
مصطلحات موضوعية: key management in wireless sensor network, limited resources and open communication channel, in addition, wireless communication poses additional threats to the critical information being sent and received over there, wsn are necessary to be protected from different attacks, but, the major problem to secure wsn is a key distribution after deploying the sensor nodes in specific area, this paper examines the design of an efficient key management distribution scheme for wsn, the proposed method based on knapsack algorithm that requires generating a series of vectors to encrypt the private keys only that will be sent to the cluster heads by base station, the same method is used by each cluster head to encrypt only the keys that will be sent to their members, the simulation results showed that the proposed key management method can offers efficient security prerequisites, suitable scalability, and connectivity to achieve authentication, Science
وصف الملف: electronic resource
-
17Academic Journal
المؤلفون: Wildatunnisa Fahriah, Tulus Febrianto
المصدر: JISA (Jurnal Informatika dan Sains), Vol 2, Iss 1, Pp 1-5 (2020)
مصطلحات موضوعية: sms, encrypt, decrypt, blok cipher, blowfish, java, Information technology, T58.5-58.64, Computer software, QA76.75-76.765
وصف الملف: electronic resource
-
18Academic Journal
المؤلفون: Sadoon Abdullah, Zahraa Abdulhamid
المصدر: Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 13, Iss 2, Pp 46-55 (2019)
مصطلحات موضوعية: dna, quick response code, encrypt, Mathematics, QA1-939, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
19Academic Journal
المؤلفون: Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
المصدر: Journal of Universal Computer Science, Vol 25, Iss 3, Pp 182-202 (2019)
مصطلحات موضوعية: attribute-based encryption, identity-based encrypt, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
20Academic Journal
المؤلفون: Febriyani, Fauziyah Suwarsita, Arfriandi, Arief
المصدر: JISKA (Jurnal Informatika Sunan Kalijaga); Vol. 6 No. 3 (2021): September 2021; 171-177 ; 2528-0074 ; 2527-5836
مصطلحات موضوعية: Digital Data, Cryptography, RC4 Algorithm, Waterfall, Website, encrypt and decrypt
وصف الملف: application/pdf
Relation: https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/2461/2372; https://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/2461