Search

Your search keyword '"DATA encryption"' showing total 4,199 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic computer communication networks Remove constraint Topic: computer communication networks Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
4,199 results on '"DATA encryption"'

Search Results

1. Secure Data Communication using File Hierarchy Attribute Based Encryption in Wireless Body Area Networks

2. Spyware and Adware

3. Secure Data Communication using File Hierarchy Attribute Based Encryption in Wireless Body Area Networks.

4. Cyber Security

14. Key Management and Distribution for Securing Multimedia Multicasts.

15. Optimizing Multicast Key Management for Cellular Multicasting.

16. Optimizing Rekeying Costs in Group Key Agreement.

17. An Authentication Service for Sensor and Ad Hoc Networks.

18. Reducing Delay and Enhancing DoS Resistance in Multicast Authentication.

19. Protecting Membership Information in Secure Multicasting.

20. Hierarchical Access Control for Multi-Group Scenarios.

21. Group Key Agreement Techniques in Heterogeneous Networks.

22. Centralized Multi-user Key Management.

23. Introduction.

34. Preventative Directions For Insider Threat Mitigation Via Access Control.

35. Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat.

36. Surviving Insider Attacks: A Call for System Experiments.

37. Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.

38. Towards a Virtualization-enabled Framework for Information Traceability (VFIT).

39. Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure.

40. A Survey of Insider Attack Detection Research.

41. Data Theft: A Prototypical Insider Threat.

42. The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures.

43. Reflections on the Insider Threat.

45. Privacy-Preserving Data Mining: A Survey.

46. Hippocratic Databases: Current Capabilities and Future Trends.

47. Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.

48. Privacy-enhanced Location-based Access Control.

49. Privacy Protection through Anonymity in Location-based Services.

50. Privacy Preserving Publication: Anonymization Frameworks and Principles.

Catalog

Books, media, physical & digital resources