Search

Your search keyword '"DATA encryption"' showing total 4,631 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Language english Remove constraint Language: english Database Academic Search Index Remove constraint Database: Academic Search Index
4,631 results on '"DATA encryption"'

Search Results

1. Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil.

2. Device Onboarding Using FDO and the Untrusted Installer Model.

3. Indistinguishability Obfuscation from Well-Founded Assumptions.

4. Hardware VM Isolation in the Cloud.

5. Secure Virtual Machine Migration and Host Overload Detection Using Modified Pelican Optimization with Variable Load Mean Function.

6. Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks.

7. Residue Number System Based S-box Generation and its Applications in AES for Image Encryption.

8. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

9. Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes.

10. A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.

11. HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern.

12. Optical image encryption and authentication scheme with computational ghost imaging.

13. Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation.

14. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

15. Implementation of New Security Features in CMSWEB Kubernetes Cluster at CERN.

16. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.

17. An encrypted deduplication scheme based on files diversity.

18. Improved RSA with Enhanced Security on STM32 @ 84MHz.

19. Physical Layer Encryption for CO-OFDM Systems Enabled by Camera Projection Scrambler.

20. Leveraging chaos for enhancing encryption and compression in large cloud data transfers.

21. Fractal Tent Map with Application to Surrogate Testing.

22. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System.

23. Quantum circuit implementations of lightweight authenticated encryption ASCON.

24. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.

25. A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method.

26. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

27. Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.

28. Modulation of Excimer Formation and Photoexcitation Behaviour through DNA‐Surfactant‐Dye Supramolecular Assembly.

29. The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.

30. Constructive approach and randomization of a two-parameter chaos system for securing data.

31. An Efficient Lightweight Authentication Scheme for Smart Meter.

32. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

33. E2EE enhanced patient-centric blockchain-based system for EHR management.

34. Security Analysis of the Symmetric Cryptosystem TinyJambu.

35. A Modified AES-512 Bits Algorithm for Data Encryption.

36. Novel true random bit generation and its audio encryption application with Lorenz chaotic circuit-based entropy source.

37. Unlocking the Potential of Fully Homomorphic Encryption: Exploring the transformational potential of FHE and the path toward adoption of its "stack".

38. ARE BOOKS AND BRAINS WEAPONS? THE U.S. GOVERNMENT THINKS SO.

39. Functional integration of handwritten digit recognition and encryption/decryption based on Pt/GaOx/TiN memristor array for a new data security system.

40. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.

41. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

42. Brochosome-inspired binary metastructures for pixel-by-pixel thermal signature control.

43. IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency.

44. Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access.

45. Improved secure PCA and LDA algorithms for intelligent computing in IoT‐to‐cloud setting.

46. A secure SoC architecture design with dual DMA controllers.

47. High key rate continuous-variable quantum key distribution using telecom optical components.

48. Amine Gas‐Induced Reversible Optical Bleaching of Bismuth‐Based Lead‐Free Perovskite Thin Films.

49. Disruption mitigation in the semiconductors supply chain by using public blockchains.

50. End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption.

Catalog

Books, media, physical & digital resources