Search

Your search keyword '"DATA encryption"' showing total 5,521 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Type Books Remove constraint Publication Type: Books
5,521 results on '"DATA encryption"'

Search Results

1. Serious cryptography : a practical introduction to modern encryption.

2. Cyber Security

3. Chaotic Generator in Digital Secure Communication.

4. TransCrypt: an Enterprise Encrypting File System over NFS.

5. Securing Cover-File Without Limitation of Hidden Data Size Using Computation Between Cryptography and Steganography.

6. Assessing a Sparse Distributed Memory Using Different Encoding Methods.

7. Securing BGP Networks using Consistent Check Algorithm.

8. Currently Committed Crypt Analysis Hash Function.

9. IDENTITY THEFT.

10. Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.

11. Risk & Distortion Based K-Anonymity.

12. Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones.

13. Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.

14. Geometrically Invariant Image Watermarking in the DWT Domain.

15. ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.

16. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.

17. Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.

18. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.

19. A Compositional Multiple Policies Operating System Security Model.

20. Authorization Constraints Specification of RBAC.

21. On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.

22. A Generic Method for Secure SBox Implementation.

23. Security Analysis of MISTY1.

24. Breaking 104 Bit WEP in Less Than 60 Seconds.

25. Efficient Implementation of the Pairing on Mobilephones Using BREW.

26. An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.

27. Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.

28. Detecting Motifs in System Call Sequences.

29. A Fusion of Maximum Likelihood and Structural Steganalysis.

30. Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.

31. A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.

32. Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.

33. Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.

34. Implementation of LSM-Based RBAC Module for Embedded System.

35. Practical Security Analysis of Dirty Paper Trellis Watermarking.

36. Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.

37. Secret Signatures: How to Achieve Business Privacy Efficiently?

38. Boudot's Range-Bounded Commitment Scheme Revisited.

39. Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.

40. Universal ηT Pairing Algorithm over Arbitrary Extension Degree.

41. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.

42. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding.

43. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.

44. Exposing Digital Forgeries Through Specular Highlights on the Eye.

45. Tamper Hiding: Defeating Image Forensics.

46. Combining Tardos Fingerprinting Codes and Fingercasting.

47. A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.

48. Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.

49. Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.

50. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.

Catalog

Books, media, physical & digital resources