Výsledky vyhledávání - "Encryption-algorithm"
-
1
Autoři: a další
Zdroj: ICT Express, Vol 11, Iss 5, Pp 945-950 (2025)
Témata: Blockchain, Composite logistic sine map, Consumer electronics, Electronic health records, Patient data, Proxy re-encryption algorithm, Information technology, T58.5-58.64
Popis souboru: electronic resource
Relation: http://www.sciencedirect.com/science/article/pii/S2405959525001249; https://doaj.org/toc/2405-9595
Přístupová URL adresa: https://doaj.org/article/ae68fa24affe4a9b885fc6c5349123db
-
2
Autoři: YI Qiuzhi, TANG Hongbo, QIU Hang
Zdroj: Jisuanji gongcheng, Vol 51, Iss 7, Pp 254-262 (2025)
Témata: searchable encryption algorithm, multi-keyword encryption algorithm, bloom filter, diffle-hellman assumption, discrete logarithm problem, Computer engineering. Computer hardware, TK7885-7895, Computer software, QA76.75-76.765
Popis souboru: electronic resource
Relation: https://www.ecice06.com/fileup/1000-3428/PDF/jsjgc-51-7-254.pdf; https://doaj.org/toc/1000-3428
Přístupová URL adresa: https://doaj.org/article/f8f9c86ed0b84c728bbd08d666ba2726
-
3
Autoři: Zhour, Oumazouz
Zdroj: International Journal of Mathematics and Computer Science. :465-468
Témata: decryption algorithm, cryptographic systems, sequence of local complementations, Cryptography, Algebraic coding theory, cryptography (number-theoretic aspects), Paley graphs, encryption algorithm, quadratic residues
Popis souboru: application/xml
Přístupová URL adresa: https://zbmath.org/7968952
https://doi.org/10.69793/ijmcs/02.2025/zhour -
4
Autoři:
Zdroj: Ain Shams Engineering Journal, Vol 16, Iss 10, Pp 103562- (2025)
Témata: Electronic health records, Attribute-based encryption algorithm, Mirrored byzantine fault tolerance consensus algorithm, Blockchain, Blockchain technology, Engineering (General). Civil engineering (General), TA1-2040
Popis souboru: electronic resource
Relation: http://www.sciencedirect.com/science/article/pii/S209044792500303X; https://doaj.org/toc/2090-4479
Přístupová URL adresa: https://doaj.org/article/2df85c227f26458aa00966493200943f
-
5
Autoři: a další
Zdroj: Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)
Témata: Fractional-order quantum logistic-tent map, Image encryption algorithm, Compressed sensing, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Relation: https://doaj.org/toc/2523-3246
Přístupová URL adresa: https://doaj.org/article/61a28e84f27f4ec7a1e20285969a3c86
-
6
Zdroj: NaUKMA Research Papers. Computer Science; Vol. 7 (2024): NaUKMA Research Papers. Computer Science; 89-97
Наукові записки НаУКМА. Комп'ютерні науки; Том 7 (2024): Наукові записки НаУКМА. Комп’ютерні науки; 89-97Témata: Functional Encryption (FE), Internet of Things, архітектура IoT, TLS протокол, IoT architecture, Novel Tiny Symmetric Encryption Algorithm, центр довіри, TLS protocol, протокол, Інтернет речей, вразливості безпеки, DTLS, Lightweight CA Cipher (LCC) та Functional Encryption (FE), Lightweight CA Cipher (LCC), protocol, security vulnerabilities, trust center
Popis souboru: application/pdf
Přístupová URL adresa: http://nrpcomp.ukma.edu.ua/article/view/329686
-
7
Autoři:
Zdroj: Mohyla Mathematical Journal; Vol. 7 (2024): Mohyla Mathematical Journal; 3-8
Могилянський математичний журнал; Том 7 (2024): Могилянський математичний журнал; 3-8Témata: алгоритм Бабаї, асиметричний алгоритм шифрування, Goldwasser-Goldrich-Halevi cryptosystem, integer lattice, secret sharing scheme, asymmetric encryption algorithm, схема розподiлу секрету, цiлочисельна решiтка, криптосистема Голдвасcер-Голдрiха-Халевi, Babai algorithm
Popis souboru: application/pdf
Přístupová URL adresa: https://mmj.ukma.edu.ua/article/view/329377
-
8
Autoři:
Zdroj: Tikrit Journal of Engineering Sciences, Vol 32, Iss 4 (2025)
Témata: Data Integrity, Internet of Things, Lightweight Encryption algorithm, Mosquitto Broker, Message Queue Telemetry Transport Protocol (MQTT), Raspberry Pi, Engineering (General). Civil engineering (General), TA1-2040
Popis souboru: electronic resource
Relation: https://tj-es.com/ojs/index.php/tjes/article/view/1823; https://doaj.org/toc/1813-162X; https://doaj.org/toc/2312-7589
Přístupová URL adresa: https://doaj.org/article/50b193de839b4dd3a33d1b3ee81e3d4e
-
9
Zdroj: World Congress “Aviation in the XXI Century” – “Aviation Security and Space Technology”; 2024: XI Всесвітній конгрес “Авіація в XXI столітті” – “Безпека в авіації та космічні технології”; 11.57–11.61
Всесвітній конгрес “Авіація в XXI столітті” – “Безпека в авіації та космічні технології”; 2024: XI Всесвітній конгрес “Авіація в XXI столітті” – “Безпека в авіації та космічні технології”; 11.57–11.61Témata: ПЛІС, strengthening encryption algorithm, UAV, БПЛА, communication channel, канал зв'язку, FPGA, посилений алгоритм шифрування
Popis souboru: application/pdf
Přístupová URL adresa: https://jrnl.nau.edu.ua/index.php/congress/article/view/19810
-
10
Autoři:
Zdroj: Journal of Applied Science and Engineering, Vol 28, Iss 9, Pp 1731-1738 (2025)
Témata: Chemical engineering, blockchain asymmetric encryption algorithm, Physics, QC1-999, generative adversarial network, TP155-156, kernel principal component analysis, TA1-2040, Engineering (General). Civil engineering (General), medical data privacy protection
Přístupová URL adresa: https://doaj.org/article/2ffce4850b0247dca634627baedf2247
-
11
Zdroj: Technical Engineering; No. 2(94) (2024); 174-179
Техническая инженерия; № 2(94) (2024); 174-179
Технічна інженерія; № 2(94) (2024); 174-179Témata: cybersecurity, AES128 symmetric block encryption algorithm, інтернет речей (ІоТ), IoT network protection, Internet of Things (IoT), limit computing, контролер ESP32, lightweight cryptography, граничні обчислення, Edge Computing, MQTT-брокер, MQTT broker, кібербезпека, легковагова криптографія, ESP32 controller, захист ІоТ-мереж, симетричний алгоритм блочного шифрування AES128
Popis souboru: application/pdf
Přístupová URL adresa: http://ten.ztu.edu.ua/article/view/319719
-
12
Autoři: a další
Témata: Biotechnology, Science Policy, Plant Biology, Space Science, Mathematical Sciences not elsewhere classified, Information Systems not elsewhere classified, security issues caused, resistive acoustic sensor, nanoacoustic sensors makes, attracted public attention, tiny encryption algorithm, chaotic encryption algorithm, different encryption algorithms, achieve data encryption, different distribution, speech encryption, encryption effect, data encryption, protect data, potential mechanism, popular nanomaterial, personal privacy, neural network, nanosensor applications, mechanical properties, intelligent terminals, information transmission, information leakage, fuzzily characterized, extensively researched
-
13
Autoři: a další
Přispěvatelé: a další
Zdroj: International Journal of Information Security and Privacy. 18:1-27
Témata: Elliptic, 0806 Information Systems, Cryptography, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, 0805 Distributed Computing, 02 engineering and technology, Encryption algorithm, Cryptosystem, 0802 Computation Theory and Mathematics
Popis souboru: 27 p
-
14
Autoři: a další
Zdroj: International Journal of Electrical Power & Energy Systems, Vol 166, Iss , Pp 110523- (2025)
Témata: Multi-microgrids, Virtual power plant, Blockchain, Trading mechanism, Market fairness, Encryption algorithm, Production of electric energy or power. Powerplants. Central stations, TK1001-1841
Popis souboru: electronic resource
Relation: http://www.sciencedirect.com/science/article/pii/S0142061525000742; https://doaj.org/toc/0142-0615
Přístupová URL adresa: https://doaj.org/article/832567ab4271480bb1ac2558780d1bc2
-
15
Autoři: a další
Zdroj: 网络与信息安全学报, Vol 10, Pp 164-176 (2024)
Témata: smart IoT, edge-area smart terminals, mimic defense, DHR architecture, Paillier encryption algorithm, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Relation: http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024088; https://doaj.org/toc/2096-109X
Přístupová URL adresa: https://doaj.org/article/c3276dc743c748c3abb25fa0c73e1d7a
-
16
Autoři:
Zdroj: Технічна інженерія, Vol 94, Iss 2, Pp 174-179 (2024)
Témata: internet of things (iot), iot network protection, esp32 controller, mqtt broker, cybersecurity, aes128 symmetric block encryption algorithm, lightweight cryptography, limit computing, edge computing, Engineering (General). Civil engineering (General), TA1-2040
Popis souboru: electronic resource
Relation: http://ten.ztu.edu.ua/article/view/319719; https://doaj.org/toc/2706-5847; https://doaj.org/toc/2707-9619
Přístupová URL adresa: https://doaj.org/article/c85dbfab12984c7ea2c1cf8fdf94b345
-
17
Autoři: a další
Zdroj: Algorithms, Vol 18, Iss 7, p 406 (2025)
Témata: AES encryption algorithm, chaotic maps, secure data transmission, steganography, video processing, Industrial engineering. Management engineering, T55.4-60.8, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/ebe1ab07a37b4a6498363c13e14419f3
-
18
Autoři: a další
Zdroj: 电力工程技术, Vol 43, Iss 5, Pp 2-12 (2024)
Témata: weak centralization, energy sharing, prosumer, privacy protection, conditional value at risk (cvar), paillier homomorphic encryption algorithm, Applications of electric power, TK4001-4102
Popis souboru: electronic resource
Relation: https://www.epet-info.com/dlgcjsen/article/abstract/240126076; https://doaj.org/toc/2096-3203
Přístupová URL adresa: https://doaj.org/article/d2be33c6057d400290561fa80fe9ad16
-
19
Autoři: a další
Témata: Algebraic analysis, Exponentiation modulo, Galois field, Nonpositional polynomial notations, S-block, Strict avalanche criterion, Symmetric encryption algorithm
Relation: https://zenodo.org/records/14869136; oai:zenodo.org:14869136
-
20
Autoři:
Zdroj: Technical Engineering; No. 2(94) (2024); 174-179 ; Техническая инженерия; № 2(94) (2024); 174-179 ; Технічна інженерія; № 2(94) (2024); 174-179 ; 2707-9619 ; 2706-5847
Témata: Internet of Things (IoT), IoT network protection, ESP32 controller, MQTT broker, cybersecurity, AES128 symmetric block encryption algorithm, lightweight cryptography, limit computing, Edge Computing, інтернет речей (ІоТ), захист ІоТ-мереж, контролер ESP32, MQTT-брокер, кібербезпека, симетричний алгоритм блочного шифрування AES128, легковагова криптографія, граничні обчислення
Popis souboru: application/pdf
Relation: http://ten.ztu.edu.ua/article/view/319719/310302; http://ten.ztu.edu.ua/article/view/319719
Dostupnost: http://ten.ztu.edu.ua/article/view/319719
Full Text Finder
Nájsť tento článok vo Web of Science