Search

Your search keyword '"DATA encryption"' showing total 3,415 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic management of computing and information systems Remove constraint Topic: management of computing and information systems Publisher springer nature Remove constraint Publisher: springer nature
3,415 results on '"DATA encryption"'

Search Results

1. Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones.

2. Authorization Constraints Specification of RBAC.

3. A Compositional Multiple Policies Operating System Security Model.

4. Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.

5. On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.

6. ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.

7. Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.

8. Risk & Distortion Based K-Anonymity.

9. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.

10. Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.

11. A Generic Method for Secure SBox Implementation.

12. Security Analysis of MISTY1.

13. Efficient Implementation of the Pairing on Mobilephones Using BREW.

14. Breaking 104 Bit WEP in Less Than 60 Seconds.

15. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.

16. Detecting Motifs in System Call Sequences.

17. An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.

18. Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.

19. A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.

20. Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.

21. Geometrically Invariant Image Watermarking in the DWT Domain.

22. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.

23. Implementation of LSM-Based RBAC Module for Embedded System.

24. Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.

25. Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.

26. Secret Signatures: How to Achieve Business Privacy Efficiently?

27. Universal ηT Pairing Algorithm over Arbitrary Extension Degree.

28. Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.

29. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding.

30. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.

31. A Fusion of Maximum Likelihood and Structural Steganalysis.

32. Security of Invertible Media Authentication Schemes Revisited.

33. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.

34. Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.

35. A Graph Game Model for Software Tamper Protection.

36. Tamper Hiding: Defeating Image Forensics.

37. Exposing Digital Forgeries Through Specular Highlights on the Eye.

38. Combining Tardos Fingerprinting Codes and Fingercasting.

39. Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.

40. A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization.

41. Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio.

42. Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction.

43. Reducing the Complexity of Syndrome Coding for Embedding.

44. How Can Reed-Solomon Codes Improve Steganographic Schemes?

45. Steganographic Communication with Quantum Information.

46. Practical Security Analysis of Dirty Paper Trellis Watermarking.

47. Exploiting Security Holes in Lattice Data Hiding.

48. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.

49. Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation.

50. Space-Efficient Kleptography Without Random Oracles.

Catalog

Books, media, physical & digital resources