Search

Your search keyword '"DATA encryption"' showing total 29,345 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption"
29,345 results on '"DATA encryption"'

Search Results

151. Secure Control of Linear Controllers Using Fully Homomorphic Encryption.

152. Fine‐grained assured insertion and deletion scheme based on onion encryption in cloud storage.

153. Fully Homomorphic Encryption Scheme for Securing Cloud Data.

154. Twin-field quantum encryption protocol for E-payment based on blockchain.

155. A novel deep learning based intrusion detection system for the IoT-Cloud platform with blockchain and data encryption mechanisms.

156. XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era †.

157. On Multiple Encryption for Public-Key Cryptography.

158. Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud.

159. A New Hybrid Diffie-Hellman and Caesar Cipher Algorithm for Cryptography.

160. 基于FPGA 的高速国密SM4 光纤通信系统方案.

161. Hyperchaotic technology-based efficient image encryption algorithm an overview.

162. Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (2 32)) and High Irreducible Polynomials.

163. Dynamics of Semiconductor Laser Coupled with Two External Cavities.

164. Chaotic Map Based Raster Data Encryption for Geospatial Data.

165. A Lightweight Blockchain to Secure Data Communication in IoT Network on Healthcare System.

166. Audio Encryption Framework Using the Laplace Transformation.

167. Image Encryption Implementation by Using Memristor Based Chaotic Systems and DNA Coding.

168. CNS: Research on Data Security Technology and Network Data Security Regulations Driven by Digital Economy.

169. DNA Secret Writing With Laplace Transform of Mittag-Leffler Function.

170. A Comparative Analysis of VirLock and Bacteriophage ϕ 6 through the Lens of Game Theory.

171. A critical review of the state of computer security in the health sector.

172. Fully Homomorphic Encryption of FloatingPoint Matrices for Privacy-Preserving Image Processing.

173. Homomorphism on bipolar-valued fuzzy sub-bigroup of a bigroup for secured data transmission over WSN.

174. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

175. Modifications and improvements to the two fish encryption algorithm: A review.

176. Security architecture and applications: Blockchain perspective.

177. An approach for runtime analysis of 128 bits innovative advanced encryption standard algorithm over triple DES algorithm using VHDL.

178. A novel comparative data security analysis in public auditing for trusted cloud service with SSL encryption over multi-tenancy based access control technique.

179. A novel image retrieval method for encryption and decryption to preserve privacy using AES algorithm and comparing accuracy with DES algorithm.

180. Assessment of Statistical Properties of the LBC Lightweight Encryption Algorithm.

181. Design and FPGA implementation machine learning based steller matrix encryption and decryption for high throughput and low latency.

182. Make secure video calls with Linux.

183. Traffic Classification in an Increasingly Encrypted Web.

184. Hopewind launched hopeCloud 4.0 to revolutionize future energy management.

185. The Red and the Black.

186. STOP USING PASSWORDS.

187. PARALLELS DESKTOP 19: RUN MULTIPLE OPERATING SYSTEMS, INCLUDING WINDOWS, LINUX, AND MORE.

188. Why Data Management and Security can Spell Success for Organisations.

189. Password managers.

191. Application of IoT audio technology based on sensor networks in English speaking teaching system

192. Stretchable High-Resolution User-Interactive Synesthesia Displays for Visual-Acoustic Encryption.

193. Enabling Stereochemical Communication and Stimuli‐Responsive Chiroptical Properties in Biphenyl‐Capped Cyclodextrins.

194. Image encryption using binary polarization states of light beam.

195. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing.

196. Advancing Complexity Research in Earth Sciences and Geography.

197. HAE: A Hybrid Cryptographic Algorithm for Blockchain Medical Scenario Applications.

198. Disorder‐Enhanced Charge‐Transfer‐Mediated Room‐Temperature Phosphorescence in Polymer Media.

199. Medical Image Encryption using Biometric Image Texture Fusion.

200. CLASSICAL HOMOMORPHIC ENCRYPTION FOR QUANTUM CIRCUITS.

Catalog

Books, media, physical & digital resources