نتایج جستجو برای: data encryption

تعداد نتایج: 2426326  

2015
Peter Shah Won So

Many storage customers are adopting encryption solutions to protect critical data. Most existing encryption solutions sit in, or near, the application that is the source of critical data, upstream of the primary storage system. Placing encryption near the source ensures that data remains encrypted throughout the storage stack, making it easier to use untrusted storage, such as public clouds. Un...

Journal: :International Journal of Advanced Computer Research 2016

Journal: :IEICE Transactions 2008
Yibo Fan Jidong Wang Takeshi Ikenaga Yukiyasu Tsunoo Satoshi Goto

H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compresse...

2017
Shoulin Yin Lin Teng Jie Liu

Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, and the other party with another key receives the ciphertext. Encryp...

2003
Chung-E Wang

This paper describes cryptographic methods for concealing information during data compression processes. These include novel approaches of adding pseudo random shuffles into the processes of dictionary coding (Lampel-Ziv compression), arithmetic coding, and Huffman

2017
Kirandeep Kaur Jyotsna Sengupta

With the rapid growth of cloud computing, many users store their data and application on the cloud. However, the growth of cloud computing is slowed down by cloud security problem. Hence, cloud computing security becomes the current research focus. To secure the cloud data, encryption is used. Traditional encryption schemes cannot make cloud computing fully safe. Therefore, Fully homomorphic en...

2011
Simar Preet Singh Raman Maini

COMPARISON OF DATA ENCRYPTION ALGORITHMS Simar Preet Singh, and Raman Maini University College of Engineering, Punjabi University, Patiala, INDIA, E-mail: [email protected], [email protected] This paper tries to present a fair comparison between the most common and used algorithms in the data encryption field. The two main characteristics that identify and differentiate one en...

2001
Mohamed I. Sobhy Alaa-eldin R. Shehata

A system of encryption based on chaotic algorithms is described. The system is used for encrypting text and image files for the purpose of creating secure data bases and for sending secure email messages. The system is also implemented on an FPGA for real-time applications. Levels of security several orders of magnitude better than published systems have been achieved.

2015
Majid Bakhtiari Anazida Zainal Saeid Bakhtiari Hazinah Kutty Mammi

Comprehensive coverage of network has enabled many applications to be online. Growth in technology has produced IoT where almost every gadget is Internet enabled and this has produced massive data. Many data analytics tools and techniques have been developed to mine the data and get meaningful information out of it. With this sophisticated tools, there is a possibility that data are leaked, lea...

Journal: :International Journal of Power Electronics and Drive Systems 2023

Machine learning techniques, especially deep learning, are playing an increasingly important role in our lives. Deep uses different models to extract information from the data. They have already had a huge impact areas such as health (i.e., cancer diagnosis), self-driving cars, speech recognition, and data encryption. Recently, models, including convolutional neural networks (CNN), been proven ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید