Search alternatives:
after encryption » data encryption (Expand Search), after incubation (Expand Search)
Showing 1 - 20 results of 44 for search 'after encryption algorithm', query time: 0.26s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Encrypted results for 2KB data. by Twum Frimpong (16949252)

    Published 2024
    “…A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. …”
  9. 9

    Plaintext of file size 2KB to be encrypted. by Twum Frimpong (16949252)

    Published 2024
    “…A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. …”
  10. 10
  11. 11
  12. 12

    Novel S-Box rendered by the suggested algorithm. by Nayeem Ahmad Khan (11727377)

    Published 2025
    “…Our research contributes to the advancement of S-Box design methodologies, providing a promising avenue for strengthening encryption algorithms in contemporary cryptographic systems. …”
  13. 13
  14. 14
  15. 15

    Work flow diagram for proposed algorithm SK4OA. by Twum Frimpong (16949252)

    Published 2024
    “…A data set from Kaggle was used to determine the algorithm’s mean and standard deviation after thirty (30) times of execution. …”
  16. 16

    Coordinated medical network access request nodes. by Yonggang Huang (223155)

    Published 2025
    “…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”
  17. 17

    Trust access control attribute tree. by Yonggang Huang (223155)

    Published 2025
    “…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”
  18. 18

    Comparison of data packet loss rates. by Yonggang Huang (223155)

    Published 2025
    “…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”
  19. 19

    Experimental parameter settings. by Yonggang Huang (223155)

    Published 2025
    “…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”
  20. 20

    Access control pseudo-code. by Yonggang Huang (223155)

    Published 2025
    “…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”