Search

Your search keyword '"DATA encryption"' showing total 2,412 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic data protection Remove constraint Topic: data protection
2,412 results on '"DATA encryption"'

Search Results

1. Empowering health data protection: machine learning-enabled diabetes classification in a secure cloud-based IoT framework.

2. A Method for Designing Substitution Boxes Based on Chaos with High Nonlinearity.

3. Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment.

4. AES-128 reduced-round permutation by replacing the MixColumns function.

5. A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud.

6. Deep Homeomorphic Data Encryption for Privacy Preserving Machine Learning.

7. Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.

8. Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique.

9. CNS: Research on Data Security Technology and Network Data Security Regulations Driven by Digital Economy.

10. Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion.

11. METHOD OF INFORMATION PROTECTION BASED ON THE INTEGRATION OF PROBABILISTIC ENCRYPTION AND NOISE IMMUNE CODING.

12. Electret Molecular Configuration Induced Programmable Photonic Memory for Advanced Logic Operation and Data Encryption.

13. Algoritmos del cifrado para protección de datos biométricos.

14. Multi-Source Data Privacy ProtectionMethod Based on Homomorphic Encryption and Blockchain.

15. Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality.

16. A QR Code Used for Personal Information Based on Multi-Layer Encryption System.

17. The Data Privacy Protection Method for Hyperledger Fabric Based on Trustzone.

18. New member of the data protection squad.

19. A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach.

20. INERTIAL ENERGY STORAGE SYSTEM, APPLICATIVE EXTENSION.

21. Distributed storage scheme for encryption speech data based on blockchain and IPFS.

22. Advanced Data Security Using Hybrid Cryptography and Steganography.

23. Performance Analysis of Hybrid Cryptographic Algorithms Rabbit Stream and Enhanced Dual RSA.

24. Multi-Layer Token Framework for Data Protection in Cloud Computing.

25. Research on Secure Encryption and Transmission of Disaster Backup of Massive Data Based on Cloud Computing.

26. A novel block encryption method based on Catalan random walks.

27. Social conceptions versus legal protections of privacy and information security in the context of encryption.

28. Network Information Security Data Protection Based on Data Encryption Technology.

29. Encryption Technology for Computer Network Data Security Protection.

30. A Repeatable Dual‐Encryption Platform from Recyclable Thermosets with Self‐Healing Ability and Shape Memory Effect.

31. Blockchain-Based Privacy-Preserving Approach Using SVML for Encrypted Smart City Data in the Era of IR 4.0.

32. The Fundraiser's Transfer of Personal Data from the European Union to the United States in Context of Crowdfunding Activities.

33. Data protection based neural cryptography and deoxyribonucleic acid.

34. Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case.

35. Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud.

36. Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography.

37. A Dynamic Light-Weight Symmetric Encryption Algorithm for Secure Data Transmission via BLE Beacons.

38. Review of secure the online multimedia data using chaotic map and steganography techniques.

39. Lightweight and High-Performance Data Protection for Edge Network Security.

40. Patent data access control and protection using blockchain technology.

41. A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique.

42. Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method.

43. A response to the European Data Protection Supervisor 'Misunderstandings in Biometrics' by the European Association for Biometrics.

44. European Union ∙ The EDPS on Europol's Big Data Challenge in Light of the Recast Europol Regulation: The Question of Legitimizing Unlawful Practices.

45. INFORMATION SECURITY WITH CRYPTOGRAPHY SYMMETRIC KEY ENCRYPTION ALGORITHMS: A SURVEY.

46. A fusion data security protection scheme for sensitive E-documents in the open network environment.

47. A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems.

48. Mechanically gated data display via synergizing the mechanochromism of chiral photonic elastomers and optically responsive molecules.

49. BIOMETRIC AUTHENTICATION BASED MEDICAL DATA MANAGEMENT IN CLOUD SYSTEMS.

50. The New Method of Sensor Data Privacy Protection for IoT.

Catalog

Books, media, physical & digital resources