Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data HealthcareRashmi, P. ; Supriya, M. C. ; Hua, Qiaozhi Chakraborty, Chinmay ; Chinmay ChakrabortySecurity and communication networks, 2022-02, Vol.2022, p.1-9 [Periódico revisado por pares]London: HindawiTexto completo disponível |
|
2 |
Material Type: Artigo
|
Computer Network Security Management of Data Encryption TechnologySun, Caiping ; Wang, Weijiang Hashmi, Mohammad Farukh ; Mohammad Farukh HashmiWireless communications and mobile computing, 2022-09, Vol.2022, p.1-9 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
|
3 |
Material Type: Artigo
|
Image Encryption with Double Spiral Scans and Chaotic MapsTang, Zhenjun ; Yang, Ye ; Xu, Shijie ; Yu, Chunqiang ; Zhang, Xianquan Del Rey, Angel M. ; Angel M Del ReySecurity and communication networks, 2019-01, Vol.2019, p.1-15 [Periódico revisado por pares]London: HindawiTexto completo disponível |
|
4 |
Material Type: Artigo
|
Application Research of Data Encryption Algorithm in Computer Security ManagementGong, Qianru Nagaraj, Balakrishnan ; Balakrishnan NagarajWireless communications and mobile computing, 2022-07, Vol.2022, p.1-7 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
|
5 |
Material Type: Artigo
|
IIBE: An Improved Identity-Based Encryption Algorithm for WSN SecurityCao, ChunHua ; Tang, YaNa ; Huang, DeYan ; Gan, WeiMin ; Zhang, Chunjiong Su, Jian ; Jian SuSecurity and communication networks, 2021, Vol.2021, p.1-8 [Periódico revisado por pares]London: HindawiTexto completo disponível |
|
6 |
Material Type: Artigo
|
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption StandardRamachandra, Mohan Naik ; Srinivasa Rao, Madala ; Lai, Wen Cheng ; Parameshachari, Bidare Divakarachari ; Ananda Babu, Jayachandra ; Hemalatha, Kivudujogappa LingappaBig data and cognitive computing, 2022-12, Vol.6 (4), p.101 [Periódico revisado por pares]Basel: MDPI AGTexto completo disponível |
|
7 |
Material Type: Artigo
|
An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5GGupta, Rajeev Kumar ; Almuzaini, Khalid K. ; Pateriya, R. K. ; Shah, Kaushal ; Shukla, Piyush Kumar ; Akwafo, Reynah Hashmi, Mohammad Farukh ; Mohammad Farukh HashmiWireless communications and mobile computing, 2022-03, Vol.2022, p.1-14 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
|
8 |
Material Type: Artigo
|
Blockchain Data Privacy Access Control Based on Searchable Attribute EncryptionFeng, Tao ; Pei, Hongmei ; Ma, Rong ; Tian, Youliang ; Feng, XiaoqinComputers, materials & continua, 2021-01, Vol.66 (1), p.871-890Texto completo disponível |
|
9 |
Material Type: Artigo
|
Encryption Technology for Computer Network Data Security ProtectionYu, Yang Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-08, Vol.2022, p.1-9 [Periódico revisado por pares]London: HindawiTexto completo disponível |
|
10 |
Material Type: Artigo
|
A novel image encryption scheme based on quantum dynamical spinning and rotationsKhan, Majid ; Waseem, Hafiz Muhammad Li, LixiangPloS one, 2018-11, Vol.13 (11), p.e0206460-e0206460 [Periódico revisado por pares]United States: Public Library of ScienceTexto completo disponível |