Search

Your search keyword '"DATA encryption"' showing total 29,315 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption"
29,315 results on '"DATA encryption"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. Indistinguishability Obfuscation from Well-Founded Assumptions.

3. Hardware VM Isolation in the Cloud.

4. A data security model for internet of things applications.

5. Enhancement of KASUMI algorithm by adding hamming code.

6. The State of Cyber Resilience: Advancements and Future Directions

7. Palmprint Encryption and Authentication Method Based on Masked Autoencoders

8. A Holistic Approach to Elderly Safety: Sensor Fusion, Fall Detection, and Privacy-Preserving Techniques

9. Quantum circuit implementations of lightweight authenticated encryption ASCON.

10. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

11. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

12. Synchronously Thermochromic and Shape‐Shifting Liquid Crystal Elastomers Enabled by Hierarchical Structure Control for Multidimensional Encryption.

13. Sparse Compression-Based Image Encryption using Data Encryption Standards RC5.

14. APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization.

15. An Efficient Lightweight Authentication Scheme for Smart Meter.

16. Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design.

17. Construction of a network intelligence platform for privacy protection and integrated big data mining.

18. Security Analysis of the Symmetric Cryptosystem TinyJambu.

19. Novel true random bit generation and its audio encryption application with Lorenz chaotic circuit-based entropy source.

20. A combination of hill cipher and RC4 methods for text security.

21. Enhancing the performance of network in wireless body area network based on novel encryption algorithm.

22. E2EE enhanced patient-centric blockchain-based system for EHR management.

23. Integrating the edge computing paradigm into the development of IoT forensic methodologies.

24. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication.

25. Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model.

26. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.

27. Functional integration of handwritten digit recognition and encryption/decryption based on Pt/GaOx/TiN memristor array for a new data security system.

28. DEVELOPMENT OF HIGH-SPEED ALGORITHM FOR BINOMIAL ARITHMETIC ADDITION.

29. Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy.

30. Quantum video encryption based on bitplanes and improved Arnold scrambling.

31. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.

32. Brochosome-inspired binary metastructures for pixel-by-pixel thermal signature control.

33. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication.

34. An Evaluation of the User Experience and Privacy Concerns of Individuals Misusing Opioids Using a Location Tracking Mobile Application.

35. Novel hybrid chaotic map-based secure data transmission between smart meter and HAN devices.

36. An innovative approach for runtime analysis of 128 bits AES algorithm by comparing with DES algorithm using VHDL.

37. Functional analysis of the use of blockchain technology in the internet of things (IoT).

38. A dynamic encryption scheme for moving object protection using network coding and DES.

39. Fog computing security using token-based authentication system.

40. Hadoop-based secure storage solution for big data in cloud computing environment

41. A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks

42. Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things

43. High speed national secret SM4 optical fiber communication system scheme based on FPGA

44. DNA Secret Writing With Laplace Transform of Mittag-Leffler Function

45. Unlocking the Potential of Fully Homomorphic Encryption: Exploring the transformational potential of FHE and the path toward adoption of its "stack".

46. The cruellest con artists.

47. Optical image encryption and authentication scheme with computational ghost imaging.

48. A secure SoC architecture design with dual DMA controllers.

49. Improved secure PCA and LDA algorithms for intelligent computing in IoT‐to‐cloud setting.

50. Multi‐Responsive Afterglows from Aqueous Processable Amorphous Polysaccharide Films.

Catalog

Books, media, physical & digital resources