Search

Your search keyword '"DATA encryption"' showing total 30,077 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption"
30,077 results on '"DATA encryption"'

Search Results

202. The State of Cyber Resilience: Advancements and Future Directions

203. Palmprint Encryption and Authentication Method Based on Masked Autoencoders

204. A Holistic Approach to Elderly Safety: Sensor Fusion, Fall Detection, and Privacy-Preserving Techniques

205. RISE OF THE ROBOTS.

206. The ultimate Christmas gift guide.

207. Unlocking the Potential of Fully Homomorphic Encryption: Exploring the transformational potential of FHE and the path toward adoption of its "stack".

208. Securing Workloads in the Cloud: Challenges and Best Practices.

209. 1Password: Keep your passwords safe and secure.

210. Make secure video calls with Linux.

211. KEY CONCEPTS AND CURRENT TECHNICAL TRENDS IN CRYPTOGRAPHY FOR POLICY MAKERS.

212. Securing Apache and Other Web Servers: Best Practices and Strategies.

213. Data encryption/decryption and medical image reconstruction based on a sustainable biomemristor designed logic gate circuit

214. Energy‐Efficient and Resilient Secure Routing in Energy Harvesting Wireless Sensor Networks with Transceiver Noises: EcoSecNet Design and Analysis.

215. Quantum circuit implementations of lightweight authenticated encryption ASCON.

216. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids.

217. User-centric secured smart virtual assistants framework for disables.

218. Secure and Scalable Internet of Things Model Using Post-Quantum MACsec.

219. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

220. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

221. APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization.

222. A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method.

223. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

224. Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH †.

225. Sparse Compression-Based Image Encryption using Data Encryption Standards RC5.

226. Multilevel Information Encryption Mediated by Reconfigurable Thermal Emission in Smart Bilayer Material.

227. Modulation of Excimer Formation and Photoexcitation Behaviour through DNA‐Surfactant‐Dye Supramolecular Assembly.

228. The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.

229. Privacy-Preserving Confidential Reporting System With Designated Reporters.

230. Kth min Threshold Encryption for Privacy-preserving Data Evaluation.

231. Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics.

232. AN ADAPTIVE ELLIPTICAL CURVE CRYPTOGRAPHY-RIVEST-SHAMIR-ADLEMAN-BASED ENCRYPTION FOR IoT HEALTHCARE SECURITY MODEL WITH BLOCKCHAIN TECHNOLOGY.

233. Constructive approach and randomization of a two-parameter chaos system for securing data.

234. Synchronously Thermochromic and Shape‐Shifting Liquid Crystal Elastomers Enabled by Hierarchical Structure Control for Multidimensional Encryption.

235. Inference Analysis of Video Quality of Experience in Relation with Face Emotion, Video Advertisement, and ITU-T P.1203.

236. Empowering health data protection: machine learning-enabled diabetes classification in a secure cloud-based IoT framework.

237. Secure Communication Between Unmanned Aerial Vehicle and Ground Control Station.

238. Research on cloud robot security strategy based on chaos encryption.

239. Data transmission channel protection organization in client-server software architecture.

240. Adapting confiscation and anti-money laundering laws to the digital economy: exploring the Australian interplay between proceeds and technology.

241. A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability.

242. Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.

243. An Efficient Lightweight Authentication Scheme for Smart Meter.

244. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.

245. A novel AES–DES with improved Cheetah optimisation algorithm for secured medical data transmission in cloud environment.

246. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

247. Construction of a network intelligence platform for privacy protection and integrated big data mining.

248. E2EE enhanced patient-centric blockchain-based system for EHR management.

249. Integrating the edge computing paradigm into the development of IoT forensic methodologies.

250. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.

Catalog

Books, media, physical & digital resources