Search

Your search keyword '"DATA encryption"' showing total 204 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publisher association for computing machinery Remove constraint Publisher: association for computing machinery
204 results on '"DATA encryption"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. Indistinguishability Obfuscation from Well-Founded Assumptions.

3. Hardware VM Isolation in the Cloud.

4. Unlocking the Potential of Fully Homomorphic Encryption: Exploring the transformational potential of FHE and the path toward adoption of its "stack".

5. Traffic Classification in an Increasingly Encrypted Web.

6. SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq.

7. Hiding Secrets in Programs: Technical Perspective.

8. Toward Confidential Cloud Computing.

9. DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications.

10. The Long Road Ahead to Transition to Post-Quantum Cryptography: Anticipating the output of the competition for new cryptographic algorithms.

11. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey.

12. Metadata-Private Communication for the 99%.

13. GRNN: Generative Regression Neural Network—A Data Leakage Attack for Federated Learning.

14. Imperfect forward secrecy.

15. Asia’s Surging Interest in Binary Analysis.

17. Encryption and surveillance.

18. Questioning quantum.

19. Economic and Business Dimensions Blockchain Revolution without the Blockchain?

20. Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation.

21. 40 Years of Suffix Trees.

22. Hopes, Fears, and Software Obfuscation.

23. Seeking Anonymity in an Internet Panopticon.

24. Bitcoin: Under the Hood.

25. When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind? On cryptographic backdoors and prosthetic intelligence.

26. Far-Sighted Thinking about Deleterious Computer-Related Events.

27. Secure Quantum Communications.

28. The NSA and Snowden: Securing the All-Seeing Eye.

29. Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks.

30. Functional Encryption: A New Vision for Public-Key Cryptography.

31. CryptDB: Processing Queries on an Encrypted Database.

32. Long-Term Confidentiality of PKI.

33. A Survey on Authenticated Encryption—ASIC Designer’s Perspective.

34. A Survey on Fully Homomorphic Encryption: An Engineering Perspective.

35. Secure and Fast Encryption (SAFE) with Classical Random Number Generators.

36. QIP = PSPACE.

37. Computing Arbitrary Functions of Encrypted Data.

38. Wireless Insecurity: Examining User Security Behavior on Public Networks.

39. The Key to Privacy.

40. Security in Dynamic Web Content Management Systems Applications.

41. PERSPECTIVES FOR CRYPTOGRAPHIC LONG-TERM SECURITY.

42. Disk Wiping By Any Other Name.

43. Cyber Warfare: Steganography vs. Steganalysis.

44. Superscaled Security.

45. WATERMARK-BASED COPYRIGHT PROTECTION SYSTEM SECURITY.

46. ENABLING CRYPTO: HOW RADICAL INNOVATIONS OCCUR.

47. Ultimate Cryptography.

48. Designing Cryptography for the New Century.

49. Secure-System Designers Strive to Stem Data Leaks.

50. Researchers Probe Security Through Obscurity.

Catalog

Books, media, physical & digital resources