Suchergebnisse - "encryption algorithm"
-
1
Autoren: et al.
Quelle: ICT Express, Vol 11, Iss 5, Pp 945-950 (2025)
Schlagwörter: Blockchain, Composite logistic sine map, Consumer electronics, Electronic health records, Patient data, Proxy re-encryption algorithm, Information technology, T58.5-58.64
Dateibeschreibung: electronic resource
-
2
Autoren: YI Qiuzhi, TANG Hongbo, QIU Hang
Quelle: Jisuanji gongcheng, Vol 51, Iss 7, Pp 254-262 (2025)
Schlagwörter: searchable encryption algorithm, multi-keyword encryption algorithm, bloom filter, diffle-hellman assumption, discrete logarithm problem, Computer engineering. Computer hardware, TK7885-7895, Computer software, QA76.75-76.765
Dateibeschreibung: electronic resource
-
3
Autoren: Zhour, Oumazouz
Quelle: International Journal of Mathematics and Computer Science. :465-468
Schlagwörter: decryption algorithm, cryptographic systems, sequence of local complementations, Cryptography, Algebraic coding theory, cryptography (number-theoretic aspects), Paley graphs, encryption algorithm, quadratic residues
Dateibeschreibung: application/xml
-
4
Autoren:
Quelle: Ain Shams Engineering Journal, Vol 16, Iss 10, Pp 103562- (2025)
Schlagwörter: Electronic health records, Attribute-based encryption algorithm, Mirrored byzantine fault tolerance consensus algorithm, Blockchain, Blockchain technology, Engineering (General). Civil engineering (General), TA1-2040
Dateibeschreibung: electronic resource
-
5
Autoren: et al.
Quelle: Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)
Schlagwörter: Fractional-order quantum logistic-tent map, Image encryption algorithm, Compressed sensing, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/2523-3246
-
6
Quelle: NaUKMA Research Papers. Computer Science; Vol. 7 (2024): NaUKMA Research Papers. Computer Science; 89-97
Наукові записки НаУКМА. Комп'ютерні науки; Том 7 (2024): Наукові записки НаУКМА. Комп’ютерні науки; 89-97Schlagwörter: Functional Encryption (FE), Internet of Things, архітектура IoT, TLS протокол, IoT architecture, Novel Tiny Symmetric Encryption Algorithm, центр довіри, TLS protocol, протокол, Інтернет речей, вразливості безпеки, DTLS, Lightweight CA Cipher (LCC) та Functional Encryption (FE), Lightweight CA Cipher (LCC), protocol, security vulnerabilities, trust center
Dateibeschreibung: application/pdf
Zugangs-URL: http://nrpcomp.ukma.edu.ua/article/view/329686
-
7
Autoren:
Quelle: Mohyla Mathematical Journal; Vol. 7 (2024): Mohyla Mathematical Journal; 3-8
Могилянський математичний журнал; Том 7 (2024): Могилянський математичний журнал; 3-8Schlagwörter: алгоритм Бабаї, асиметричний алгоритм шифрування, Goldwasser-Goldrich-Halevi cryptosystem, integer lattice, secret sharing scheme, asymmetric encryption algorithm, схема розподiлу секрету, цiлочисельна решiтка, криптосистема Голдвасcер-Голдрiха-Халевi, Babai algorithm
Dateibeschreibung: application/pdf
Zugangs-URL: https://mmj.ukma.edu.ua/article/view/329377
-
8
Autoren:
Quelle: Tikrit Journal of Engineering Sciences, Vol 32, Iss 4 (2025)
Schlagwörter: Data Integrity, Internet of Things, Lightweight Encryption algorithm, Mosquitto Broker, Message Queue Telemetry Transport Protocol (MQTT), Raspberry Pi, Engineering (General). Civil engineering (General), TA1-2040
Dateibeschreibung: electronic resource
-
9
Quelle: World Congress “Aviation in the XXI Century” – “Aviation Security and Space Technology”; 2024: XI Всесвітній конгрес “Авіація в XXI столітті” – “Безпека в авіації та космічні технології”; 11.57–11.61
Всесвітній конгрес “Авіація в XXI столітті” – “Безпека в авіації та космічні технології”; 2024: XI Всесвітній конгрес “Авіація в XXI столітті” – “Безпека в авіації та космічні технології”; 11.57–11.61Schlagwörter: ПЛІС, strengthening encryption algorithm, UAV, БПЛА, communication channel, канал зв'язку, FPGA, посилений алгоритм шифрування
Dateibeschreibung: application/pdf
-
10
Autoren:
Quelle: Journal of Applied Science and Engineering, Vol 28, Iss 9, Pp 1731-1738 (2025)
-
11
Quelle: Technical Engineering; No. 2(94) (2024); 174-179
Техническая инженерия; № 2(94) (2024); 174-179
Технічна інженерія; № 2(94) (2024); 174-179Schlagwörter: cybersecurity, AES128 symmetric block encryption algorithm, інтернет речей (ІоТ), IoT network protection, Internet of Things (IoT), limit computing, контролер ESP32, lightweight cryptography, граничні обчислення, Edge Computing, MQTT-брокер, MQTT broker, кібербезпека, легковагова криптографія, ESP32 controller, захист ІоТ-мереж, симетричний алгоритм блочного шифрування AES128
Dateibeschreibung: application/pdf
Zugangs-URL: http://ten.ztu.edu.ua/article/view/319719
-
12
Autoren: et al.
Schlagwörter: Biotechnology, Science Policy, Plant Biology, Space Science, Mathematical Sciences not elsewhere classified, Information Systems not elsewhere classified, security issues caused, resistive acoustic sensor, nanoacoustic sensors makes, attracted public attention, tiny encryption algorithm, chaotic encryption algorithm, different encryption algorithms, achieve data encryption, different distribution, speech encryption, encryption effect, data encryption, protect data, potential mechanism, popular nanomaterial, personal privacy, neural network, nanosensor applications, mechanical properties, intelligent terminals, information transmission, information leakage, fuzzily characterized, extensively researched
-
13
Autoren: et al.
Weitere Verfasser: et al.
Quelle: International Journal of Information Security and Privacy. 18:1-27
Schlagwörter: Elliptic, 0806 Information Systems, Cryptography, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, 0805 Distributed Computing, 02 engineering and technology, Encryption algorithm, Cryptosystem, 0802 Computation Theory and Mathematics
Dateibeschreibung: 27 p
-
14
Autoren: et al.
Quelle: International Journal of Electrical Power & Energy Systems, Vol 166, Iss , Pp 110523- (2025)
Schlagwörter: Multi-microgrids, Virtual power plant, Blockchain, Trading mechanism, Market fairness, Encryption algorithm, Production of electric energy or power. Powerplants. Central stations, TK1001-1841
Dateibeschreibung: electronic resource
-
15
Autoren: et al.
Quelle: 网络与信息安全学报, Vol 10, Pp 164-176 (2024)
Schlagwörter: smart IoT, edge-area smart terminals, mimic defense, DHR architecture, Paillier encryption algorithm, Electronic computers. Computer science, QA75.5-76.95
Dateibeschreibung: electronic resource
-
16
Autoren:
Quelle: Технічна інженерія, Vol 94, Iss 2, Pp 174-179 (2024)
Schlagwörter: internet of things (iot), iot network protection, esp32 controller, mqtt broker, cybersecurity, aes128 symmetric block encryption algorithm, lightweight cryptography, limit computing, edge computing, Engineering (General). Civil engineering (General), TA1-2040
Dateibeschreibung: electronic resource
-
17
Autoren: et al.
Quelle: Algorithms, Vol 18, Iss 7, p 406 (2025)
Schlagwörter: AES encryption algorithm, chaotic maps, secure data transmission, steganography, video processing, Industrial engineering. Management engineering, T55.4-60.8, Electronic computers. Computer science, QA75.5-76.95
Dateibeschreibung: electronic resource
-
18
Autoren: et al.
Quelle: 电力工程技术, Vol 43, Iss 5, Pp 2-12 (2024)
Schlagwörter: weak centralization, energy sharing, prosumer, privacy protection, conditional value at risk (cvar), paillier homomorphic encryption algorithm, Applications of electric power, TK4001-4102
Dateibeschreibung: electronic resource
-
19
Autoren: et al.
Schlagwörter: Algebraic analysis, Exponentiation modulo, Galois field, Nonpositional polynomial notations, S-block, Strict avalanche criterion, Symmetric encryption algorithm
Relation: https://zenodo.org/records/14869136; oai:zenodo.org:14869136
-
20
Autoren:
Quelle: Technical Engineering; No. 2(94) (2024); 174-179 ; Техническая инженерия; № 2(94) (2024); 174-179 ; Технічна інженерія; № 2(94) (2024); 174-179 ; 2707-9619 ; 2706-5847
Schlagwörter: Internet of Things (IoT), IoT network protection, ESP32 controller, MQTT broker, cybersecurity, AES128 symmetric block encryption algorithm, lightweight cryptography, limit computing, Edge Computing, інтернет речей (ІоТ), захист ІоТ-мереж, контролер ESP32, MQTT-брокер, кібербезпека, симетричний алгоритм блочного шифрування AES128, легковагова криптографія, граничні обчислення
Dateibeschreibung: application/pdf
Relation: http://ten.ztu.edu.ua/article/view/319719/310302; http://ten.ztu.edu.ua/article/view/319719
Verfügbarkeit: http://ten.ztu.edu.ua/article/view/319719
Full Text Finder
Nájsť tento článok vo Web of Science