Search

Your search keyword '"DATA encryption"' showing total 10,693 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
10,693 results on '"DATA encryption"'

Search Results

151. Secure Communication Between Unmanned Aerial Vehicle and Ground Control Station.

152. Adapting confiscation and anti-money laundering laws to the digital economy: exploring the Australian interplay between proceeds and technology.

153. Research on cloud robot security strategy based on chaos encryption.

154. Empowering health data protection: machine learning-enabled diabetes classification in a secure cloud-based IoT framework.

155. A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability.

156. Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.

157. An Efficient Lightweight Authentication Scheme for Smart Meter.

158. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.

159. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

160. Construction of a network intelligence platform for privacy protection and integrated big data mining.

161. E2EE enhanced patient-centric blockchain-based system for EHR management.

162. Integrating the edge computing paradigm into the development of IoT forensic methodologies.

163. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.

164. Security Analysis of the Symmetric Cryptosystem TinyJambu.

165. Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model.

166. Hybrid optimization enabled secure privacy preserved data sharing based on blockchain.

167. A combination of hill cipher and RC4 methods for text security.

168. Enhancing the performance of network in wireless body area network based on novel encryption algorithm.

169. A Modified AES-512 Bits Algorithm for Data Encryption.

170. Novel true random bit generation and its audio encryption application with Lorenz chaotic circuit-based entropy source.

171. Secure Data Delivery in a Software-Defined Wireless Body Area Network.

172. Design of a new DNA Encryption Algorithm based on Simon Algorithm.

173. Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.

174. IMPROVING USER SECURITY DURING A CALL.

175. Uncovering Cybersecurity Vulnerabilities: A Kali Linux Investigative Exploration Perspective.

176. Digital Forensics Readiness Framework (DFRF) to Secure Database Systems.

177. EVALUATION OF CURRENT KNOWLEDGE LEVEL ON DATA SECURITY OF PEOPLE WORKING IN A MEDICAL ENVIRONMENT.

178. New Steganography Technique by Integrating Genetic Algorithm and Data Hiding.

179. Efficient Cybersecurity Assessment Using SVM and Fuzzy Evidential Reasoning for Resilient Infrastructure.

180. Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector.

181. JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation.

182. The Vulnerabilities of Electronic Land Certificates and Legal Adaptation in Indonesia's Land Registration System.

183. A SaaS Concept-Based Shopping Center Fire Risk Assessment Model for the Safety Management Applications.

184. Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.

185. Unlocking the Potential of Fully Homomorphic Encryption: Exploring the transformational potential of FHE and the path toward adoption of its "stack".

186. Enhancement of KASUMI algorithm by adding hamming code.

187. An innovative approach for runtime analysis of 128 bits AES algorithm by comparing with DES algorithm using VHDL.

188. Functional analysis of the use of blockchain technology in the internet of things (IoT).

189. A dynamic encryption scheme for moving object protection using network coding and DES.

190. CLARIFYING DEFINITIONS: A SCOPING REVIEW OF DATA PHYSICALIZATION IN HUMAN-COMPUTER INTERACTION.

191. Cloud computing empowerment: a comprehensive examination of adoption, security, and efficiency in legal industry.

192. Robust optical multi-image encryption with lossless decryption Recovery Based on phase recombination and vector decomposition

193. Hadoop-based secure storage solution for big data in cloud computing environment

194. A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks

195. Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things

196. Accenture and SandboxAQ expand partnership to strengthen data encryption

197. KEY CONCEPTS AND CURRENT TECHNICAL TRENDS IN CRYPTOGRAPHY FOR POLICY MAKERS.

198. Securing Apache and Other Web Servers: Best Practices and Strategies.

199. The cruellest con artists.

200. E-discovery Tools and Strategies to Save Time, Reduce Costs, and Improve Outcomes.

Catalog

Books, media, physical & digital resources