Search Result "data cipher difference"


Research Article

Comparative Randomness Analysis of DES Variants

Journal: Recent Patents on Computer Science
Volume: 10 Issue: 3 Year: 2017 Page: 230-237
Author(s): Malik Qasaimeh,Raad S. Al-Qassas

Research Article

Achieving Secure, Flexible, Effective and Privacy Preserving Data Access Control in Cloud Computing

Journal: Recent Patents on Computer Science
Volume: 11 Issue: 3 Year: 2018 Page: 196-205
Author(s): Imad El Ghoubach,Fatiha Mrabti,Rachid Ben Abbou

Research Article

An Advanced Encryption Algorithm for Enhancing Data Security in Cloud Computing

Journal: Recent Advances in Electrical & Electronic Engineering
Volume: 17 Issue: 0 Year: 2024 Page: 1-13
Author(s): Swati Dhondiram Jadhav,Kanchan S. Tiwari

Respite for Customer’s Privacy Issues using Privacy Preserving Data Mining

Ebook: Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies
Volume: 1 Year: 2021
Author(s): Ankita,Deepak Kumar
Doi: 10.2174/9789814998451121010004

Review Article

Key Independent Image Deciphering using Neighbourhood Similarity Characteristics and Divide-and-conquer Attack

Journal: Recent Patents on Engineering
Volume: 15 Issue: 4 Year: 2021 Page: 6-16
Author(s): Ram Ratan,Arvind Yadav

Blockchain Framework for Data Storage and Security

Ebook: Recent Advances in IoT and Blockchain Technology
Volume: 4 Year: 2022
Author(s):
Doi: 10.2174/9789815051605122040003

Research Article

A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 2 Year: 2020 Page: 123-142
Author(s): Showkat Ahmad Bhat,Amandeep Singh

Recent Advances on Documents Authentication Based on the Data Hiding and Watermarking Techniques

Journal: Recent Patents on Computer Science
Volume: 3 Issue: 3 Year: 2010 Page: 233-243
Author(s): Huijuan Yang, Xudong Jiang, Alex C. Kot

Review of Solutions for Securing End-User Data Over Cloud Applications

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010008

Research Article

A Hybrid Security System Based on Bit Rotation and Chaotic Maps

Journal: Current Signal Transduction Therapy
Volume: 14 Issue: 2 Year: 2019 Page: 152-157
Author(s): Majdi Al-qdah

Previous   Next

Go To   Results 1 - 1 of 78

Apply Filters

Volume Years
Article Type
Publication Title
Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy