Search

Your search keyword '"Digital security"' showing total 2,094 results

Search Constraints

Start Over You searched for: Descriptor "Digital security" Remove constraint Descriptor: "Digital security"
2,094 results on '"Digital security"'

Search Results

202. Nudging to Change, the Role of Digital Health

203. Counting and Matching

207. Deep learning assisted side-channel analysis evaluation. Becoming friend of a misunderstood monster

208. SoK: SCA-secure ECC in software – mission impossible?

209. Evaluación de la competencia digital de futuros docentes para el uso seguro y responsable de Internet

211. Sufficient Statistics and Split Idempotents in Discrete Probability Theory

216. Reflection machines: Supporting effective human oversight over medical decision support systems

217. ФОРМИРОВАНИЕ ЦИФРОВОЙ ГРАМОТНОСТИ СТУДЕНТОВ ВУЗА

218. The Power of Bamboo: On the Post-Compromise ty for Searchable Symmetric Encryption

219. Preface to Volume 2023, Issue 1

221. Digital Security in Educational Training Programs: A Study based on Future Teachers’ Perceptions

222. Hope of Delivery: Extracting User Locations From Mobile Instant Messengers

223. SoK: Deep Learning-based Physical Side-channel Analysis

224. NeuroSCA: Evolving Activation Functions for Side-Channel Analysis

225. Spectre Declassified: Reading from the Right Place at the Wrong Time

226. Weak Subtweakeys in SKINNY

228. НАПРАВЛЕНИЯ ОБЕСПЕЧЕНИЯ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ РЕГИОНА: СТРАТЕГИЧЕСКИЙ АСПЕКТ РЕГИОНАЛЬНОЙ КИБЕРБЕЗОПАСНОСТИ

229. Rus scharrelt rond vitale zeekabels

230. No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis

233. Disorientation Faults in CSIDH

234. ЦИФРОВАЯ ЭКОНОМИКА В РОССИИ, КНР И РЕСПУБЛИКЕ КОРЕЯ: КОМПАРАТИВНЫЙ АНАЛИЗ

237. Typing High-Speed Cryptography against Spectre v1

238. « Se protéger ou périr »

239. Guest Editorial: Trustworthy AI

240. Cybersecurity and the new firm: surviving online threats

241. 'The truth of what’s happening' How Tibetan exile media develop and maintain journalistic authority

242. Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review

243. Security Culture in Digital Inter-Organizational Ecosystems.

244. Low-Latency Boolean Functions and Bijective S-boxes

246. ‘Google wants to know your location’: The ethical challenges of fieldwork in the digital age.

247. Uncensored journalism in censored times: Challenges of reporting on Azerbaijan

248. Digital welfare fraud detection and the Dutch SyRI judgment

249. Demystifying the Draft EU Artificial Intelligence Act — Analysing the good, the bad, and the unclear elements of the proposed approach

250. Analysis of digital competence of educators (DigCompEdu) in teacher trainees: the context of Melilla, Spain

Catalog

Books, media, physical & digital resources