Data Security in Cloud Computing using Encryption and Obfuscation Techniques
K C Suthar, Dr. Jayesh M Patel
openalex +1 more source
Encryption based on inverse iterating composition cellular automata system
Ping Ping +4 more
openalex +1 more source
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
Optimizing color image security using hybrid cryptographic techniques based on sine and logistic maps. [PDF]
Koulouh F +5 more
europepmc +1 more source
Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
semanticscholar +1 more source
Image encryption with 6D hyperchaotic system and vision transformer autoencoder. [PDF]
Maity A +4 more
europepmc +1 more source
KmerCrypt: private k-mer search with homomorphic encryption [PDF]
Kimonas Provatas +2 more
openalex +1 more source
Homomorphic encryption enables privacy preserving polygenic risk scores. [PDF]
Knight E +5 more
europepmc +1 more source
Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems. [PDF]
Ghani NA +4 more
europepmc +1 more source

