CrossRef Text and Data Mining
Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining.
A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Journal of Information Processing Systems. 2016;12(4):688-710.   Published online 2016 December 31    DOI: https://doi.org/10.3745/JIPS.03.0056

Excel Download

Integrating Business Process Models with Rules
Modeling with Rules Using Semantic Knowledge Engineering. 2017;313-337   
Link1

Better Support for User Participation Using Business Rules Approach?
Information Systems Development. 2011;297-308   
Link1

Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm
Journal of Information Security and Applications. 2023;72:103391   
Link1 Link2

A novel approach for privacy homomorphism using attribute‐based encryption
Security and Communication Networks. 2016;9(17):4451-4467   
Link1 Link2 Link3

A Novel Graph Clustering Algorithm with Enhanced Security using Power Method and Homomorphic Encryption
2023 1st International Conference on Optimization Techniques for Learning (ICOTL). 2023;1-6   
Link1

A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function
Journal of Information Security and Applications. 2020;54:102560   
Link1 Link2

Modified Parametric Optimization Color Image Security Algorithm Using Latin Square Encryption Approach
2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). 2024;1-6   
Link1

A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines
Computer Modeling in Engineering & Sciences. 2020;122(1):323-349   
Link1

China relaxes rules on encryption products
Network Security. 2000;2000(4):4-5   
Link1 Link2 Link3

Image scrambling encryption using chaotic map and genetic algorithm: a hybrid approach for enhanced security
Nonlinear Dynamics. 2024;112(14):12537-12564   
Link1 Link2 Link3

This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015.