Author:
Iavich Maksim,Gnatyuk Sergiy,Jintcharadze Elza,Polishchuk Yuliia,Fesenko Andriy,Abisheva Akmaral
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhanced cryptography techniques using inherited process with cyclic crossover operation in big data;International Journal of Modeling, Simulation, and Scientific Computing;2024-08-22
2. Research on Encryption Technology in "Internet +" Big Data Security;2023 9th International Conference on Big Data and Information Analytics (BigDIA);2023-12-15
3. Modifications and improvements to the two fish encryption algorithm: A review;2ND INTERNATIONAL CONFERENCE OF MATHEMATICS, APPLIED SCIENCES, INFORMATION AND COMMUNICATION TECHNOLOGY;2023
4. A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces;2022 19th Annual International Conference on Privacy, Security & Trust (PST);2022-08-22