Search

Your search keyword '"DATA encryption"' showing total 4,664 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
4,664 results on '"DATA encryption"'

Search Results

1. Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil.

2. Device Onboarding Using FDO and the Untrusted Installer Model.

3. Indistinguishability Obfuscation from Well-Founded Assumptions.

4. Hardware VM Isolation in the Cloud.

5. Secure Virtual Machine Migration and Host Overload Detection Using Modified Pelican Optimization with Variable Load Mean Function.

6. Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks.

7. Residue Number System Based S-box Generation and its Applications in AES for Image Encryption.

8. Enhancing privacy and security in IoT-based smart grid system using encryption-based fog computing.

9. Some Properties and Algorithms for Twin Primes.

10. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

11. Demonstration of microwave single-shot quantum key distribution.

12. Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes.

13. Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack.

14. ShinyAnonymizer Enhanced Version and Beyond: A Further Exploration of Privacy-Preserving Solutions in Health Data Management †.

15. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations.

16. Some Remarks on Cocks' Identity-Based Encryption Scheme.

17. Hybrid encryption based on a generative adversarial network.

18. Advancing cryptography: a novel hybrid cipher design merging Feistel and SPN structures.

19. Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy.

20. Stochastic switching and analog-state programmable memristor and its utilization for homomorphic encryption hardware.

21. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

22. A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.

23. HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern.

24. Optical image encryption and authentication scheme with computational ghost imaging.

25. Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation.

26. Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods.

27. Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control.

28. A FRAMEWORK OF DIGITAL TWINS FOR IMPROVING RESPIRATORY HEALTH AND HEALTHCARE MEASURES.

29. SECURE ENCRYPTED TRANSMISSION OF NETWORK DATA IN CLOUD COMPUTING TECHNOLOGY ENVIRONMENT.

30. Convolutional neural network-based high capacity predictor estimation for reversible data embedding in cloud network.

31. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

32. Anti‐leakage transmission method of high privacy information in electric power communication network based on digital watermarking technology.

33. Design of data storage scheme for coal mine personnel precise positioning system

34. Implementation of New Security Features in CMSWEB Kubernetes Cluster at CERN.

35. GENIUS TIPS.

36. Beat the scammers.

37. ASK.

38. Securing Workloads in the Cloud: Challenges and Best Practices.

39. Make secure video calls with Linux.

40. Information encoding and encryption in acoustic analogues of qubits

41. Improved RSA with Enhanced Security on STM32 @ 84MHz.

42. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud.

43. Physical Layer Encryption for CO-OFDM Systems Enabled by Camera Projection Scrambler.

44. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

45. Photochromic luminescence of organic crystals arising from subtle molecular rearrangement.

46. Leveraging chaos for enhancing encryption and compression in large cloud data transfers.

47. Fractal Tent Map with Application to Surrogate Testing.

48. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System.

49. Perform The Complex EFG Transform in Cryptography.

50. QUMA: Quantum Unified Medical Architecture Using Blockchain.

Catalog

Books, media, physical & digital resources