Search

Your search keyword '"DATA encryption"' showing total 10,701 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
10,701 results on '"DATA encryption"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. Indistinguishability Obfuscation from Well-Founded Assumptions.

3. Hardware VM Isolation in the Cloud.

4. A data security model for internet of things applications.

5. Enhancement of KASUMI algorithm by adding hamming code.

6. The State of Cyber Resilience: Advancements and Future Directions

7. Palmprint Encryption and Authentication Method Based on Masked Autoencoders

8. A Holistic Approach to Elderly Safety: Sensor Fusion, Fall Detection, and Privacy-Preserving Techniques

9. Quantum circuit implementations of lightweight authenticated encryption ASCON.

10. User-centric secured smart virtual assistants framework for disables.

11. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

12. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

13. Modulation of Excimer Formation and Photoexcitation Behaviour through DNA‐Surfactant‐Dye Supramolecular Assembly.

14. Multilevel Information Encryption Mediated by Reconfigurable Thermal Emission in Smart Bilayer Material.

15. Synchronously Thermochromic and Shape‐Shifting Liquid Crystal Elastomers Enabled by Hierarchical Structure Control for Multidimensional Encryption.

16. Sparse Compression-Based Image Encryption using Data Encryption Standards RC5.

17. APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization.

18. Empowering health data protection: machine learning-enabled diabetes classification in a secure cloud-based IoT framework.

19. Research on cloud robot security strategy based on chaos encryption.

20. Adapting confiscation and anti-money laundering laws to the digital economy: exploring the Australian interplay between proceeds and technology.

21. An Efficient Lightweight Authentication Scheme for Smart Meter.

22. Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.

23. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.

24. Construction of a network intelligence platform for privacy protection and integrated big data mining.

25. Security Analysis of the Symmetric Cryptosystem TinyJambu.

26. Novel true random bit generation and its audio encryption application with Lorenz chaotic circuit-based entropy source.

27. A combination of hill cipher and RC4 methods for text security.

28. Enhancing the performance of network in wireless body area network based on novel encryption algorithm.

29. E2EE enhanced patient-centric blockchain-based system for EHR management.

30. Integrating the edge computing paradigm into the development of IoT forensic methodologies.

31. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

32. Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model.

33. A SaaS Concept-Based Shopping Center Fire Risk Assessment Model for the Safety Management Applications.

34. Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.

35. Analysis of Cryptographic Algorithms to Improve Cybersecurity in the Industrial Electrical Sector.

36. JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation.

37. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.

38. End-to-end security enabled intelligent remote IoT monitoring system.

39. Nucleic-acid-base photofunctional cocrystal for information security and antimicrobial applications.

40. Blue Light-Excited Carbon Dot/C3N4 Nanocomposites with Long-Lived Thermally Activated Delay Fluorescence for Anti-Counterfeiting and Illumination.

41. Image security using steganography and cryptography with sweeping computational ghost imaging.

42. Functional integration of handwritten digit recognition and encryption/decryption based on Pt/GaOx/TiN memristor array for a new data security system.

43. A Method for Designing Substitution Boxes Based on Chaos with High Nonlinearity.

44. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.

45. Thermally tunable binary-phase VO2 metasurfaces for switchable holography and digital encryption.

46. Electrochromic nanopixels with optical duality for optical encryption applications.

47. DEVELOPMENT OF HIGH-SPEED ALGORITHM FOR BINOMIAL ARITHMETIC ADDITION.

48. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

49. Quantum video encryption based on bitplanes and improved Arnold scrambling.

50. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.

Catalog

Books, media, physical & digital resources