12 results for encryption.

Parameters for your search query:
Keyword     encryption

Open AccessArticle
Export: RIS | BibTeX | EndNote
Data Warehouse Signature: A Framework for Implementing Security Issues in Data Warehouses
Journal of Computer Sciences and Applications. 2017, 5(1), 17-24. DOI: 10.12691/jcsa-5-1-3
Pub. Date: April 17, 2017Views: 15752Downloads: 13708
Figure of 8
Open AccessArticle
Export: RIS | BibTeX | EndNote
ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing
American Journal of Information Systems. 2016, 4(2), 17-31. DOI: 10.12691/ajis-4-2-1
Pub. Date: March 16, 2016Views: 28859Downloads: 27151Citations: 1
Figure of 9
Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 40306Downloads: 33839
Open AccessArticle
Export: RIS | BibTeX | EndNote
DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
Journal of Computer Sciences and Applications. 2015, 3(3), 73-78. DOI: 10.12691/jcsa-3-3-3
Pub. Date: June 10, 2015Views: 12351Downloads: 10697Citations: 6
Open AccessArticle
Export: RIS | BibTeX | EndNote
A Scheme for Delegating Program Executions without Disclosing Secret Values
Information Security and Computer Fraud. 2014, 2(2), 21-27. DOI: 10.12691/iscf-2-2-1
Pub. Date: August 26, 2014Views: 14914Downloads: 10203
Open AccessConference Paper
Export: RIS | BibTeX | EndNote
Significance of Processing Queries and Implementation of Cipher in Remote Location
Journal of Computer Sciences and Applications. 2015, 3(6), 127-129. DOI: 10.12691/jcsa-3-6-3
Pub. Date: December 30, 2015Views: 7485Downloads: 6189
Open AccessArticle
Export: RIS | BibTeX | EndNote
Linear Mix-net and a Scheme for Collecting Data from Anonymous Data Holders
Information Security and Computer Fraud. 2014, 2(3), 39-47. DOI: 10.12691/iscf-2-3-2
Pub. Date: November 11, 2014Views: 13582Downloads: 10228
Open AccessArticle
Export: RIS | BibTeX | EndNote
Science of Cryptogrraphy
International Transaction of Electrical and Computer Engineers System. 2014, 2(2), 61-66. DOI: 10.12691/iteces-2-2-3
Pub. Date: March 19, 2014Views: 14507Downloads: 9948Citations: 2
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection of Fittest Key Using Genetic Algorithm and Autocorrelation in Cryptography
Journal of Computer Sciences and Applications. 2015, 3(2), 46-51. DOI: 10.12691/jcsa-3-2-5
Pub. Date: April 23, 2015Views: 22153Downloads: 18623
This article belongs to the Special Issue Applicability of Soft Computing in NP Hard Problems
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Cryptography during Data Sharing and Accessing Over Cloud
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 12-18. DOI: 10.12691/iteces-3-1-2
Pub. Date: March 24, 2015Views: 14487Downloads: 11466Citations: 9
This article belongs to the Special Issue Special issue on Cryptography & Network Security
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects

Journals





Article Types