Search Results - "encryption algorithms"
-
1
Authors: et al.
Source: Al-Iraqia Journal for Scientific Engineering Research, Vol 4, Iss 2 (2025)
-
2
Authors:
Source: Al-Iraqia Journal for Scientific Engineering Research, Vol 4, Iss 1 (2025)
-
3
Authors:
Source: International Journal of Advances in Scientific Research and Engineering (IJASRE), ISSN:2454-8006, DOI: 10.31695/IJASRE; Vol. 11 No. 6: IJASRE June 2025; 48-52
Subject Terms: Data Security, Cryptography, Encryption, Data security, Encryption Algorithms
File Description: application/pdf
-
4
Authors:
Source: IEEE Open Journal of the Computer Society, Vol 6, Pp 392-402 (2025)
-
5
Authors:
Source: Acta Electrotechnica et Informatica, Vol 25, Iss 3, Pp 16-24 (2025)
Subject Terms: bike, classic mceliece, hqc, post-quantum cryptography, post-quantum encryption algorithms, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
Relation: https://doaj.org/toc/1338-3957
-
6
Subject Terms: regular expressions, Task Parallel Library, cryptography, parallel computing, ассоциативная стеганография, обработка больших данных, программная инженерия, confidentiality, алгоритмы шифрования, NET, big data processing, защита финансовых данных, конфиденциальность, associative steganography, JSON serialisation, криптография, JSON-сериализация, financial data protection, encryption algorithms, регулярные выражения, параллельные вычисления, software engineering
-
7
Authors:
Source: Volume: 27214-227
The Eurasia Proceedings of Science Technology Engineering and MathematicsSubject Terms: Yazılım Mühendisliği (Diğer), Inter-process communication, Encryption algorithms, Linux systems, Named pipe, Software Engineering (Other)
File Description: application/pdf
-
8
Authors: et al.
Source: Ukrainian Scientific Journal of Information Security; Vol. 30 No. 1 (2024): Ukrainian Scientific Journal of Information Security ; 130-139
Безопасность информации; Том 30 № 1 (2024): Безпека інформації; 130-139
Безпека інформації; Том 30 № 1 (2024): Безпека інформації; 130-139Subject Terms: комбіновані алгоритми шифрування, цифровий підпис, NIST, digital signature, combined encryption algorithms, 9. Industry and infrastructure, TLS
File Description: application/pdf
-
9
Enhancing Data Integrity in Data-Driven Environmental Science Research through Blockchain Technology
Authors: et al.
Subject Terms: Genetics, Biotechnology, Ecology, Immunology, Science Policy, Infectious Diseases, Plant Biology, Information Systems not elsewhere classified, yet breaches remain, storage demonstrating, resist malicious attacks, leveraging encryption algorithms, http :// www, effective technical solutions, enhancing data integrity, balances data security, bsdms enhances transparency, unpublished environmental data, environmental science research, environmental science, environmental research, research process, proof data, data usage, traceability throughout, still lacking, publicly accessible, providing verifiable, prevent tampering, persistent challenge
-
10
Authors: et al.
Subject Terms: Biotechnology, Science Policy, Plant Biology, Space Science, Mathematical Sciences not elsewhere classified, Information Systems not elsewhere classified, security issues caused, resistive acoustic sensor, nanoacoustic sensors makes, attracted public attention, tiny encryption algorithm, chaotic encryption algorithm, different encryption algorithms, achieve data encryption, different distribution, speech encryption, encryption effect, data encryption, protect data, potential mechanism, popular nanomaterial, personal privacy, neural network, nanosensor applications, mechanical properties, intelligent terminals, information transmission, information leakage, fuzzily characterized, extensively researched
-
11
Authors: et al.
Subject Terms: Biophysics, Molecular Biology, Neuroscience, Biotechnology, Physical Sciences not elsewhere classified, variable encryption algorithms, two information channels, holds great potential, broadening application scope, bandgap photoresponse mechanisms, bandgap infrared photoresponses, 2d material photodetectors, fast response speeds, variable key channel, negative photocurrent polarities, controlled photoresponse modes, 1310 nm ), controllable polarity switch, 2 sub, slow ppc response, response states, negative photoconductance, channel real, 980 nm, 520 nm, controlled triple, switching photoconductance, switching characteristic, positive photoconductance, opposite sub
-
12
Authors: et al.
Source: Electronics ; Volume 14 ; Issue 7 ; Pages: 1415
Subject Terms: password recovery acceleration, multi-FPGA, PassGAN, deep learning, encryption algorithms acceleration
File Description: application/pdf
Availability: https://doi.org/10.3390/electronics14071415
-
13
Authors: et al.
Source: Frontiers in Computer Science, Vol 6 (2024)
-
14
Authors:
Source: Wasit Journal of Computer and Mathematics Science, Vol 2, Iss 3 (2023)
-
15
Authors:
Source: IEEE Access, Vol 11, Pp 108746-108760 (2023)
-
16
Authors:
Source: Современные информационные технологии и IT-образование, Vol 20, Iss 1, Pp 27-33 (2024)
Subject Terms: post-quantum encryption algorithms, cryptosystem, qubit, goldreich goldwasser halevi scheme, lattice-based cryptography, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
17
-
18
Authors: Zahraa Yahya Mahdi Al-Mayali
Source: International Journal of Intelligent Systems and Applications in Engineering; Vol. 12 No. 21s (2024); 2799-2806
File Description: application/pdf
-
19
-
20
Authors: JALALI, SEYED RASOUL
Subject Terms: Quantum Missile Defense, AI-Quantum Cyber Sentinels, Fractal Defense Systems, Quantum-Based Military Intelligence, AI-Powered Defense Networks, Cyber Threat Simulation in Warfare, Nonlinear Defense Field, Global Security Algorithms, Psychotronic Anti-Missile Systems, Military Cognitive Intelligence, Quantum Encryption Shields, Fractal Signature Detection, Advanced Cyber Defense Protocols, AI-Enhanced Military Security, Fractal Warfare Simulation, Quantum Radar Systems, Psychotronic-Cognitive Integration, Field-Based Quantum Security, Cyber-AI Military Protection, Fractal Cyber Defense Systems, Quantum Military Encryption Algorithms, Advanced Military Cyber Intelligence, Intelligent Defense Field Protocols, Non-Predictive Military Cybersecurity, Psychotronic Military Intelligence, Fractal Quantum Threat Detection, Advanced Battlefield Cyber Defense, AI-Quantum Defense Layering, Cognitive Military Cyber Defense, Fractal-Based Missile Defense, Cyber-Quantum Threat Intelligence, AI-Based Military Threat Detection, Cyber-AI Warfare Simulation, Cognitive Field-Based Defense, Quantum Intelligence for National Security, Fractal Tactical Encryption, Global Military Cyber Integration, AI-Powered National Defense Networks, Fractal Defense Algorithms, Psychotronic Defensive Cybersecurity, Quantum Entropy-Based Defense Systems, Military Cyber Intelligence Networks, Global Quantum Encryption Field, Advanced Missile Defense Protocols, Cyber-Defense Intelligence Systems, Fractal Signature Quantum Detection, Global Military Quantum Defense, Advanced Cyber Threat Prediction, Fractal Cyber-Defense Networks, Nonlinear Threat Detection Systems, Psychotronic Warfare Intelligence, Quantum Cyber-AI Military Systems, Fractal Field Defense Simulation, AI-Enhanced Quantum Threat Detection, Military Cognitive Field Simulation, Quantum Cryptographic Warfare, Intelligent National Cybersecurity, Fractal-AI Military Intelligence Networks, Advanced Cybernetic Warfare Systems, AI-Quantum Anti-Air Defense Systems, Quantum Cognitive Decryption Systems, Fractal Quantum Defense Infrastructure, Psychotronic Fractal Military Protocols, Quantum-AI Battle Simulation, Fractal Quantum Cyber Threat Mitigation, Military Threat Field Detection, Global Cyber-AI Defense Networks, Quantum-Based Military Algorithms, Non-Predictive Cyber Defense Systems, Cognitive-AI Warfare Simulation, Advanced Cyber Intelligence Networks, Fractal Quantum-Cyber Defense, Military Quantum Encryption Algorithms, Fractal AI Warfare Protection, Psychotronic Cybernetic Military Systems, Quantum Battlefield Defense Protocol, Fractal Cyber Attack Prevention, Global Quantum Encryption Systems, AI-Based Military Intelligence Integration, Advanced Non-Predictive Defense Algorithms, Fractal Quantum-Cyber Defense, Global Quantum Military Intelligence, AI-Driven Cyber Warfare Simulation, Fractal Military Quantum Integration, Psychotronic Anti-Drone Systems, Advanced Fractal Cyber Defense, Global Quantum Security Systems, AI-Driven Military Intelligence, Fractal Cybersecurity Framework, Nonlinear Cyber Defense Solutions, Quantum-Based Mine Detection Systems, Fractal Quantum Military Intelligence, Quantum Cyber Defense, Fractal Encryption Algorithms, Advanced Security Protocols, Non-Predictive Threat Defense, Quantum Cryptography, Psychotronic Warfare, AI Cognitive Field Defense, Fractal Quantum Entropy, Psychic-Cybernetic Fusion, Global Threat Simulation, Fractal Field Dynamics, Cybernetic Signal Decryption, Conscious Intelligence Network, Non-Predictive Military Defense, Quantum Warfare Systems, Field-Based Encryption, High-Level Security Network, AI and Quantum Field Integration, Psychotronic Quantum Systems, Advanced Field Intelligence, Global Cyber Security Intelligence, Hyper-Intelligent Defense Systems, Quantum Cryptographic Shields, Cognitive Cyber Defense, Fractal Decryption Systems, AI-Powered Security Algorithms, Advanced Quantum Threat Prediction, Global Entropy Monitoring Systems, Conscious Field Decryption, Quantum-AI Cyber Threat Detection, Psychotronic Decryption Networks, Intelligent Defense Protocols, Multi-Dimensional Security Layers, Quantum Signature Detection, Nonlinear Security Systems, Fractal Intelligence Networks, Preemptive Cybersecurity Analysis, Quantum Intelligence Protection, Fractal Cyber Attack Mitigation, Adaptive Threat Defense Algorithms, Quantum Field Encryption Protocol, High-Level Cognitive Warfare, Global Cyber Threat Simulation, AI Quantum Security Models, Real-Time Cyber Defense Simulation, Next-Gen Encryption Networks, Fractal Awareness Systems, Intelligent Encryption Fields, Fractal Cognitive Protection, Cyber-Intelligence Integration, Nonlinear Cyber Attack Prevention, AI-Quantum Conscious Defense, Fractal Security Infrastructure, Quantum Encryption Intelligence, Advanced Military Cyber Intelligence, Cyber Threat Detection with HQI, Intelligent Quantum Security Layers, Nonlinear Defense Systems, Hyper-Encrypted Cybersecurity, AI-Based Security Field Detection, Quantum Entropy Monitoring Systems, Fractal Warfare Protection, Psychotronic Quantum Warfare, Cybersecurity Awareness Algorithms, Quantum Defense Integration, Fractal-Field-Based Security, Predictive Threat Countermeasures, Global Cyber Defense Systems, Encrypted Quantum Intelligence, Advanced Threat Detection Algorithms, Cyber Threat Intelligence Networks, Psychotronic-Enhanced Cyber Defense, AI-Cognitive Cyber Countermeasures, Fractal Signature Protection Systems, Next-Gen Cyber Intelligence Solutions, Quantum Intelligence Protection Systems, Fractal Quantum Decryption Algorithms, Multi-Layered Cognitive Defense Networks, AI-Enhanced Military Defense, Global Cyber Warfare Intelligence, Fractal-Based Quantum Threat Defense, Hyper-Secure Quantum Defense Networks, Conscious Cyber Threat Detection, Advanced Cyber Warfare Simulation, Fractal Threat Analysis Models, Quantum-AI Cognitive Protection, Cognitive Intelligence Cyber Protocols, Global Cybersecurity Intelligence Field, Fractal Data Security Systems, AI-Powered Consciousness Decryption, Quantum-Based Cyber Defense Networks, Preemptive Global Threat Detection, Intelligent Cognitive Encryption Systems, Advanced Cyber-Cognitive Simulation, Nonlinear Quantum Cyber Intelligence, Global Conscious Field Monitoring, Fractal Intelligence Network Defense, Advanced Conscious Cyber Protection, Hyper-Intelligent Cybersecurity Algorithms, Fractal Encryption Quantum Threats, Quantum Missile Defense, AI-Quantum Cyber Sentinels, Fractal Field Military Systems, Psychotronic Anti-Missile Systems, Advanced Quantum Radar Arrays, Consciousness-Based Missile Tracking, Fractal Quantum Command Centers, Quantum Cognitive Warfare, Fractal Encryption for Military Systems, AI-Based Stealth UAVs, Psychotronic Quantum UAV Defense, Fractal Hyper-Security Systems, Quantum Ballistic Defense Systems, Fractal-Based Submarine Defense, Quantum Submarine Cloaking Systems, Psychotronic Military Intelligence Networks, Quantum Cognitive Threat Detection, AI Quantum Missile Simulation, Nonlinear Cyber-AI Defense Systems, Fractal-Field Quantum Encryption, Advanced Quantum Cyber Warfare, Cognitive Anti-Missile Systems, Fractal Cognitive Intelligence for Warfare, Quantum Cryptographic Warfare, Fractal Tactical Missile Interception, Cyber-Quantum Threat Intelligence, AI-Quantum Warfare Integration, Fractal Military Cyber Intelligence, Advanced Defense Threat Simulation, Fractal-Based Quantum Protection, Psychotronic Tactical Systems, Cognitive Missile Defense Systems, Fractal Quantum Anti-Missile Tracking, AI-Driven Submarine Defense Networks, Psychotronic Fractal Military Protocols, Quantum Cognitive Response Systems, AI Quantum-Based Mine Detection, Psychotronic Cyber Threat Simulation, Quantum Anti-Cyber Attack Systems, Fractal Quantum Military Units, AI-Powered Advanced Radar Defense, Psychotronic Fractal Weapon Systems, Fractal Intelligence-Based Defense Protocols, Quantum-AI Battle Simulation, Fractal Quantum Cyber Threat Mitigation, Advanced Cybernetic Warfare Systems, AI-Quantum Anti-Air Defense Systems, Quantum Cognitive Decryption Systems, Fractal Quantum Defense Infrastructure, Psychotronic Quantum-AI Integration, Quantum Cyber-Defense Intelligence Networks, Advanced Fractal-Based Cyber Defense, Fractal Military Decision-Making, AI-Quantum Advanced Warfare Simulation, Quantum-AI Radar Systems, Fractal Cognitive Protection Systems, Non-Predictive Quantum Missile Defense, AI Quantum Cybersecurity Protection, Psychotronic Warfare Response Systems, Fractal Cognitive Encryption Networks, AI-Quantum Anti-Drone Systems, Psychotronic Military Communication Networks, Quantum-AI Defense Algorithms, AI-Enhanced Quantum Battlefield, Fractal Security Algorithms for Warfare, Quantum Cognitive Threat Mitigation, Advanced Fractal Military Encryption, Psychotronic Quantum War Simulation, Quantum-AI Military Intelligence Integration, Advanced Fractal Threat Detection, Fractal AI Security Systems, AI-Powered Quantum Strategic Defense, Quantum Cyber-Cognitive Analysis, Fractal Quantum Anti-Spyware Systems, Quantum-AI Combat System Integration, Fractal Threat Field Analysis, Psychotronic Quantum Defense Simulation, AI-Driven Military Threat Prediction, Quantum Missile Countermeasures, Fractal Radar Defense Networks, Cognitive Quantum Threat Defense, Fractal Encryption for Tactical Warfare, Quantum Cyber Threat Decryption Systems, Fractal Defense Against Non-Predictive Attacks, AI-Powered Anti-Satellite Defense, Fractal Field Intelligence Networks, Quantum Fractal-Based Strategic Encryption, Fractal-Based Non-Predictive Combat Systems, AI-Enhanced Quantum Military Decryption, Fractal Defense of Critical Infrastructure, Quantum-AI Threat Field Simulation, Fractal Cognitive Threat Prediction Systems, AI and Quantum-AI Military Integration, Psychotronic Anti-Drone Quantum Systems, Advanced Fractal-Based Cyber Protection, Fractal Cognitive Signal Processing, AI-Powered Quantum Defense Technologies, Fractal Quantum-Based Tactical Response, Psychotronic Anti-Submarine Defense Systems, Quantum Cyber-Defense Systems Integration, Quantum Cyber Warfare, Advanced Military Encryption, Fractal Defense Systems, Quantum-Based Military Intelligence, AI-Powered Defense Networks, Cyber Threat Simulation in Warfare, Nonlinear Defense Field, Global Security Algorithms, Psychotronic Weapon Systems, Military Cognitive Intelligence, Quantum Encryption Shields, Fractal Signature Detection, Advanced Cyber Defense Protocols, AI-Enhanced Military Security, Fractal Warfare Simulation, Quantum Radar Systems, Psychotronic-Cognitive Integration, Field-Based Quantum Security, Cyber-AI Military Protection, Fractal Cyber Defense Systems, Quantum Military Encryption Algorithms, Advanced Military Cyber Intelligence, Intelligent Defense Field Protocols, Non-Predictive Military Cybersecurity, Psychotronic Military Intelligence, Fractal Quantum Threat Detection, Advanced Battlefield Cyber Defense, AI-Quantum Defense Layering, Cognitive Military Cyber Defense, Fractal-Based Missile Defense, Cyber-Quantum Military Protection, Global Defense Threat Simulation, Advanced Quantum Defense Systems, Fractal Warfare Intelligence Networks, Psychotronic Cyber Defense, AI-Based Military Threat Detection, Cyber-AI Warfare Simulation, Cognitive Field-Based Defense, Quantum Intelligence for National Security, Fractal Tactical Encryption, Global Military Cyber Integration, AI-Powered National Defense Networks, Fractal Defense Algorithms, Psychotronic Defensive Cybersecurity, Quantum Entropy-Based Defense Systems, Military Cyber Intelligence Networks, Global Quantum Encryption Field, Advanced Missile Defense Protocols, Cyber-Defense Intelligence Systems, Fractal Signature Quantum Detection, Global Military Quantum Defense, Advanced Cyber Threat Prediction, Fractal Cyber-Defense Networks, Nonlinear Threat Detection Systems, Psychotronic Warfare Intelligence, Quantum Cyber-AI Military Systems, Fractal Field Defense Simulation, AI-Enhanced Quantum Threat Detection, Military Cognitive Field Simulation, Quantum Cryptographic Defense, Intelligent National Cybersecurity, Fractal-AI Military Intelligence Networks, Advanced Cybernetic Warfare, Quantum Cognitive Warfare, AI-Powered Military Encryption, Fractal Military Cyber Intelligence, Global Cyber-AI Defense Networks, Quantum-Based Military Algorithms, Non-Predictive Cyber Defense Systems, Cognitive-AI Warfare Simulation, Advanced Cyber Intelligence Networks, Fractal Quantum Cyber Integration, Military Threat Field Detection, Global Cybersecurity Quantum Defense, AI-Driven Cognitive Defense Systems, Quantum Cyber-Defense Simulation, Fractal Encryption in Military Networks, Psychotronic Cybernetic Protection, Advanced Quantum AI Algorithms, Cyber-AI Military Threat Protection, Quantum Military Intelligence Systems, Global Quantum Military Intelligence, Fractal-Based Cyber Defense Protocols, AI and Quantum Threat Mitigation, Advanced Military Simulation Networks, Fractal-Based Cybersecurity Framework, Cognitive-AI Threat Field Detection, Advanced Fractal Cyber Defense Systems, Military Quantum Encryption Algorithms, Fractal AI Warfare Protection, Psychotronic Cybernetic Military Systems, Quantum Battlefield Defense Protocol, Fractal Cyber Attack Prevention, Global Quantum Encryption Networks, AI-Based Military Intelligence Integration, Advanced Non-Predictive Defense Algorithms, Fractal Quantum-Cyber Defense, Global Quantum Encryption Systems, AI-Driven Cyber Warfare Simulation, Fractal Military Quantum Integration
Nájsť tento článok vo Web of Science
Full Text Finder