Search

Your search keyword '"DATA encryption"' showing total 107 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publisher taylor & francis ltd Remove constraint Publisher: taylor & francis ltd
107 results on '"DATA encryption"'

Search Results

1. Sparse Compression-Based Image Encryption using Data Encryption Standards RC5.

2. APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization.

3. Novel hybrid chaotic map-based secure data transmission between smart meter and HAN devices.

4. An Evaluation of the User Experience and Privacy Concerns of Individuals Misusing Opioids Using a Location Tracking Mobile Application.

5. Alkaline: A Simplified Post-Quantum Encryption Algorithm for Classroom Use.

6. A learning analytics perspective on educational escape rooms.

7. A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data.

8. DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot.

9. ATCA Multi-Node Management System Protocol Optimization.

10. Confidentiality attacks against encrypted control systems.

11. Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption.

12. SEEDDUP: A Three-Tier SEcurE Data DedUPlication Architecture-Based Storage and Retrieval for Cross-Domains Over Cloud.

13. Walsh Scalar Miyaguchi Preneel Cryptography for Secure Image Compression and Storage in WANET.

14. Social conceptions versus legal protections of privacy and information security in the context of encryption.

15. Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties: By Ksenia Ermoshina and Francesca Musiani, Manchester, UK: Mattering Press, 2022, 272 pp., ISBN 9781912729227, £16.00.

16. Cypherpunk ideology: objectives, profiles, and influences (1992–1998).

17. Encryption laws and regulations in one of the Five Eyes: the case of New Zealand.

18. Europol and cybercrime: Europol's sharing decryption platform.

19. Ethics, Encryption, and Evolving Concepts of Personal Privacy in the 'Black Box Library'.

20. Development and design of an FPGA-based encoder for NPN.

21. New method for improving add round key in the advanced encryption standard algorithm.

22. Leveraging the power of quantum computing for breaking RSA encryption.

23. Heeding the Signals: Applying Web best Practices when Google recommends.

24. Reversible Data Hiding in Encrypted Images Based on Hybrid Cryptosystem.

25. Statement of Retraction: Encryption Method for Blockchain based Data for Safe Transmission Using Fuzzy Algorithm.

26. RETRACTED ARTICLE: Encryption Method for Blockchain based Data for Safe Transmission Using Fuzzy Algorithm.

27. Efficient data encryption technique using quaternions for wireless sensor network.

28. An Efficient File Hierarchy Attribute Based Encryption Using Optimized Tate Pairing Construction in Cloud Environment.

29. Development of an automated system model of information protection in the cross-border exchange.

30. Drop-off drug distribution: why users choose to source illegal drugs from delivery dealers.

31. Technology and regulation: which is the tail and which is the dog?

32. Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation.

33. An IBE-based design for assured deletion in cloud storage.

34. Asymmetric encryption algorithm for colour images based on fractional Hartley transform.

35. Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning.

36. Protecting secrets: British diplomatic cipher machines in the early Cold War, 1945-1970.

37. De-identified linkage of data across separate registers: a proposal for improved protection of personal information in registry-based clinical research.

38. Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams.

39. The privacy paradox: how market privacy facilitates government surveillance.

40. Trust and accountability in the digital age: Reporting the dystopian present.

41. Hybrid Publicly Verifiable Authenticated Encryption Scheme Based on Chaotic Maps and Factoring Problems.

42. A novel secret sharing with two users based on joint transform correlator and compressive sensing.

43. Decryption oracle slide attacks on T-310.

44. A New variant of the McEliece cryptosystem based on the Smith form of convolutional codes.

45. Review of the 3rd European Historical Ciphers Colloquium in Smolenice, Slovakia.

46. The offset codebook (OCB) block cipher mode of operation for authenticated encryption.

47. Undoing encryption: the argumentative function of metonyms.

48. Forensic analysis and security assessment of Android m-banking apps.

49. Can genetic algorithms help virus writers reshape their creations and avoid detection?

50. A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory.

Catalog

Books, media, physical & digital resources