4 results for data encryption.

Parameters for your search query:
Keyword    data encryption

Open AccessArticle
Export: RIS | BibTeX | EndNote
Data Warehouse Signature: A Framework for Implementing Security Issues in Data Warehouses
Journal of Computer Sciences and Applications. 2017, 5(1), 17-24. DOI: 10.12691/jcsa-5-1-3
Pub. Date: April 17, 2017Views: 8743Downloads: 6614
Figure of 8
Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 28712Downloads: 23698
Open AccessArticle
Export: RIS | BibTeX | EndNote
Science of Cryptogrraphy
International Transaction of Electrical and Computer Engineers System. 2014, 2(2), 61-66. DOI: 10.12691/iteces-2-2-3
Pub. Date: March 19, 2014Views: 10675Downloads: 6012Citations: 2
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection of Fittest Key Using Genetic Algorithm and Autocorrelation in Cryptography
Journal of Computer Sciences and Applications. 2015, 3(2), 46-51. DOI: 10.12691/jcsa-3-2-5
Pub. Date: April 23, 2015Views: 15481Downloads: 12327
This article belongs to the Special Issue Applicability of Soft Computing in NP Hard Problems
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects

Journals



Article Types