![]() |
CrossRef Text and Data Mining |
Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining. |
A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm |
Journal of Information Processing Systems. 2016;12(4):688-710. Published online 2016 December 31 DOI: https://doi.org/10.3745/JIPS.03.0056 |
Integrating Business Process Models with Rules Better Support for User Participation Using Business Rules Approach? Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm A novel approach for privacy homomorphism using attributeābased encryption A Novel Graph Clustering Algorithm with Enhanced Security using Power Method and Homomorphic Encryption A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function Modified Parametric Optimization Color Image Security Algorithm Using Latin Square Encryption Approach 2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). 2024;1-6 ![]() A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines China relaxes rules on encryption products Image scrambling encryption using chaotic map and genetic algorithm: a hybrid approach for enhanced security |
This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015. |