-
1Academic Journal
المؤلفون: M. Jalasri, L. Lakshmanan
المصدر: Complex & Intelligent Systems, Vol 9, Iss 3, Pp 2943-2955 (2021)
مصطلحات موضوعية: Internet of Things (IoT), Fog computing, Intermediate attacks, Data security, An encryption technique, Keyed-hash message authentication code-based encryption technique, Electronic computers. Computer science, QA75.5-76.95, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Muhammed J. Al-Muhammed, Raed Abu Zitar
المصدر: Symmetry, Vol 14, Iss 218, p 218 (2022)
مصطلحات موضوعية: chaotic key expansion, encryption technique, key expansion, key round, key-echo code generation, Mathematics, QA1-939
Relation: https://www.mdpi.com/2073-8994/14/2/218; https://doaj.org/toc/2073-8994; https://doaj.org/article/460ad79e123c43cf8bc2367e57c4a6a3
-
3
المؤلفون: J. N. S. S., Janardhana Naidu, E. N., Ganesh
المصدر: International Journal of Intelligent Systems and Applications in Engineering; Vol. 11 No. 3s (2023); 119 – 128
مصطلحات موضوعية: blockchain technology, encryption technique, tiny lightweight symmetric encryption, fog computing, fog-Bus and aquila optimization algorithm
وصف الملف: application/pdf
-
4
المؤلفون: Pulgam, Namita D., Shinde, Subhash K.
المصدر: International Journal of Intelligent Systems and Applications in Engineering; Vol. 10 No. 4 (2022); 29-38
مصطلحات موضوعية: Patient Data Security, Medical Images, Digital Image Watermarking, Encryption Technique, Telemedicine
وصف الملف: application/pdf
-
5Academic Journal
المؤلفون: Fatma K Tabash, M. Izharuddin
المصدر: International Journal of Informatics and Communication Technology (IJ-ICT), 7(1), 39-48, (2018-04-01)
مصطلحات موضوعية: CABAC, Encryption technique, Real-time application and robust
Relation: oai:zenodo.org:4220749
-
6
المصدر: Military Historical Bulletin; Vol. 45 No. 3 (2022): Militari Historical Bulletin; 158-179
Воєнно-історичний вісник; Том 45 № 3 (2022): Воєнно-історичний вісник; 158-179مصطلحات موضوعية: шифрувальна машина, covert command and control of troops, конфіденційність, encryption technique, Ключова система, Key system, оперативність, приховане управління військами, шифрувальна техніка, криптографічний захист інформації, confidentiality, cryptographic protection of information, secrecy, efficiency, скритність, encryption machine
وصف الملف: application/pdf
-
7Academic Journal
المؤلفون: Shrivastava, Gaurav
المصدر: International Journal of Managment, IT and Engineering 2(1):229-238. 2012
-
8Academic Journal
المؤلفون: Brijesh Kumar, Amrita Saraswat
المصدر: International Journal of Trend in Scientific Research and Development, 1(6), 915-918, (2017-10-04)
مصطلحات موضوعية: Computer Engineering, measures Process, encryption Technique, structural design, facts security
Relation: https://doi.org/10.31142/ijtsrd4712; oai:zenodo.org:3580241
الاتاحة: https://doi.org/10.31142/ijtsrd4712
-
9Academic Journal
المؤلفون: Mr.B. Ratnakanth, Prof.P.S.Avadhani
مصطلحات موضوعية: Security protocol, smart card, encryption technique, payment protocol, E-commerce
-
10Academic Journal
المؤلفون: Gupta, Yashi, Richhariya, Dr. Vineet
المصدر: International Journal of Advanced Research in Computer Science; Vol 8, No 8 (2017): September-October; 701-704 ; 0976-5697 ; 10.26483/ijarcs.v8i8
مصطلحات موضوعية: HDFS, Security, Encryption technique, Big Data, Data Analytics
وصف الملف: application/pdf
Relation: http://www.ijarcs.info/index.php/Ijarcs/article/view/4855/4248; http://www.ijarcs.info/index.php/Ijarcs/article/view/4855
-
11Conference
المؤلفون: Demertzis K., Iliadis L., Pimenidis E., Tziritas N., Koziri M., Kikiras P., Tonkin M.
المصدر: IFIP Advances in Information and Communication Technology ; https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111809394&doi=10.1007%2f978-3-030-79150-6_60&partnerID=40&md5=3fddbeb790ec3c159bc4b7d97e6298e1
مصطلحات موضوعية: Automation, Blockchain, Cryptography, Interoperability, Privacy by design, Supply chain management, Current situation, Digital information, Digital security, Encryption technique, Hardware and software, Learning technology, Privacy frameworks, Production scale, Artificial intelligence, Springer Science and Business Media Deutschland GmbH
Relation: http://hdl.handle.net/11615/73204
-
12Academic Journal
المؤلفون: Ankur Khare, Piyush Shukla, Murtaza Rizvi, Shalini Stalin
المصدر: Entropy; Volume 18; Issue 5; Pages: 201
مصطلحات موضوعية: delay, cryptology, encryption technique, chaos function, logistic map, cipher text
وصف الملف: application/pdf
Relation: https://dx.doi.org/10.3390/e18050201
الاتاحة: https://doi.org/10.3390/e18050201
-
13Academic Journal
المؤلفون: Venkat Sampath Raja Gogineni, K.Raghava Rao
المصدر: Global Journal of Computer Science and Technology; Vol. 14 No. B3 (2014): GJCST-B Cloud and Distributed: Volume 14 Issue B3; 9-12 ; 0975-4172 ; 0975-4350
مصطلحات موضوعية: cloud security, encryption technique, modified CBC, database security, rail fence
وصف الملف: application/pdf; application/zip; text/xml; text/html; application/epub+zip; text/plain; text/x-tex
Relation: https://computerresearch.org/index.php/computer/article/view/1056/1054; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_TEI_xml_zip; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_JATS_NLM_xml; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_html; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_dbk_xml_zip; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_LaTeX_pdf; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_epub; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_md; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_fo; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_bib; https://computerresearch.org/index.php/computer/article/view/1056/1-An-Enhanced-CBC_tex; https://computerresearch.org/index.php/computer/article/view/1056
-
14Academic Journal
المؤلفون: S.Narayanan
المساهمون: S.Narayanan
مصطلحات موضوعية: Steganography, Chaos-encryption technique, Data hiding
وصف الملف: Application/pdf
-
15Academic Journal
المؤلفون: Sharma, Anuja, Jain, Anurag
المصدر: Binary Journal of Data Mining & Networking; Vol 2, No 1 (2012): Binary journal of Data Mining & Networking ; 2229–7170
مصطلحات موضوعية: Data Mining & Networking, Discrete Cosine Transformation (DCT), he simultaneous encryption technique, using chainies remainder theorem
-
16Dissertation/ Thesis
المؤلفون: Samuel, Sindhu
Thesis Advisors: Prof G P Hancke, Prof W T Penzhorn, sasamuel@gmail.com
مصطلحات موضوعية: Message randomization, Cryptography, ‘key-less’ encryption technique, Source modeling, Entropy coding, Jpeg, Arithmetic coding, Copyright, Digital watermarking, Homophonic coding, UCTD
-
17Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support
المؤلفون: Bakas, Alexandros, Michalas, Antonis
المصدر: Proceedings - IEEE Symposium on Computers and Communications.
مصطلحات موضوعية: Cloud Security, Forward Privacy, Multi-Client, Range Queries, Symmetric Searchable Encryption, Query processing, Client models, Encrypted data, Encryption technique, Power range, Range query, Searchable encryptions, Trusted execution environments, Cryptography
وصف الملف: print
-
18
المؤلفون: Smita Kapse, Vivek Waghmare
المصدر: Procedia Computer Science. 78:815-823
مصطلحات موضوعية: 020203 distributed computing, Information privacy, Convergent encryption, Database, business.industry, Computer science, Deduplication, Client-side encryption, Cloud computing, Plaintext, 02 engineering and technology, privacy preserving, computer.software_genre, Encryption, 020202 computer hardware & architecture, Computer data storage, Data_FILES, 0202 electrical engineering, electronic engineering, information engineering, convergent encryption technique, General Earth and Planetary Sciences, Data deduplication, business, Cloud storage, computer, General Environmental Science
-
19Book
المؤلفون: Quist-Aphetsi, Kester, Nana, Laurent Tchamnda, Pascu, Anca Christine, Gire, Sophie, Moses Eghan, Jojo, Quaynor, Nii Narku
المساهمون: Lab-STICC_UBO_CID_SFIIS, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom Paris (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom Paris (IMT)-Centre National de la Recherche Scientifique (CNRS)
المصدر: Pattern Analysis, Intelligent Security and the Internet of Things ; https://hal.univ-brest.fr/hal-01171537 ; Pattern Analysis, Intelligent Security and the Internet of Things, 355, Springer International Publishing, pp.149-157, 2015, Advances in Intelligent Systems and Computing, 978-3-319-17397-9. ⟨10.1007/978-3-319-17398-6_14⟩
مصطلحات موضوعية: cryptographic encryption technique, mpeg digital video images, security of the digital images, [INFO]Computer Science [cs]
Relation: hal-01171537; https://hal.univ-brest.fr/hal-01171537
-
20Book
المؤلفون: Quist-Aphetsi, Kester, Pascu, Anca Christine, Nana, Laurent Tchamnda, Gire, Sophie, Moses Eghan, Jojo, Quaynor, Nii Narku
المساهمون: Lab-STICC_UBO_CID_SFIIS, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom Paris (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom Paris (IMT)-Centre National de la Recherche Scientifique (CNRS), Springer International Publishing
المصدر: Computational Science and Its Applications - ICCSA 2015 ; https://hal.univ-brest.fr/hal-01171540 ; Springer International Publishing. Computational Science and Its Applications - ICCSA 2015, 9158, Springer International Publishing, pp.712, 2015, Lecture Notes in Computer Science, 978-3-319-21409-2. ⟨10.1007/978-3-319-21410-8_54⟩
مصطلحات موضوعية: digital image security, encryption technique, formal concept analysis, image structure lattice, [INFO]Computer Science [cs]
Relation: hal-01171540; https://hal.univ-brest.fr/hal-01171540