بدائل البحث:
user encryption » secure encryption (توسيع البحث)
يعرض 1 - 4 نتائج من 4 نتيجة بحث عن 'user encryption algorithm', وقت الاستعلام: 0.03s تنقيح النتائج
  1. 1

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique حسب Syeda Tayyaba Bukhari (21842078)

    منشور في 2024
    "…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …"
  2. 2

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System حسب Mohd Imran (12249782)

    منشور في 2025
    "…Our main contribution includes: (a) Secure template generation by Mobius transformation using user keyset (p, q), (b) Securing the user template using permutation and encryption operation. …"
  3. 3

    Improving the security of SNMP in wireless networks حسب Otrok, H.

    منشور في 2017
    "…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…However, this training process may raise the issue of privacy loss due to the disclosure of<u> sensitive information</u> of the users. Researchers have proposed various techniques to mitigate this issue, such as <u>differential privacy, homomorphic encryption, </u>and<u> federated learning.…"