Search

Your search keyword '"DATA encryption"' showing total 95 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publication Year Range This year Remove constraint Publication Year Range: This year
95 results on '"DATA encryption"'

Search Results

3. Enhancing Digital Security in Fintech Through Integration of Generative AI in Regulatory Practices

5. Secure Why-Not Spatial Keyword Top-k Queries in Cloud Environments

7. Convergence of Blockchain and Iot

8. Efficient service gain centric trust analysis model for enhanced data security on EHR data using blockchain.

9. Secure and energy-efficient inter- and intra-cluster optimization scheme for smart cities using UAV-assisted wireless sensor networks.

10. An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework.

11. Optimized Adaboost Support Vector Machine-Based Encryption for Securing IoT-Cloud Healthcare Data.

12. An efficient snow flake schema with hash map using SHA-256 based on data masking for securing employee data.

13. Digital Content Security by Butterfly and Elliptic Curve Cryptography with Channel Optimization.

14. 3D printing of thermochromic multilayer flexible film for multilevel information encryption.

15. A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map.

16. Input Aware Lightweight Cryptosystem for IoT Infrastructure – Design, Implementation and Validation on Reconfigurable Hardware.

17. A synchronous compression and encryption method for massive electricity consumption data privacy preserving.

18. Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata.

19. In-memory encryption using the advanced encryption standard.

20. Enterprise internal audit data encryption based on blockchain technology.

21. ANALYSIS OF THE DEVELOPMENT OF AN EARLY DETECTION SYSTEM FOR CRYPTOGRAPHIC-BASED RANSOMWARE ATTACKS IN A CLOUD ENVIRONMENT.

22. Encrypted Engagement: Mapping Messaging App Use in European News Consumption Patterns.

23. Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation.

24. Differential sensing approaches for scattering-based holographic encryption.

25. RPC-Chain: 基于信誉机制与 受控 PRE 的众包模型链.

26. OSL-ABE: an optimal secure and lightweight attribute-based encryption method for blockchain-enabled IoT-based healthcare systems.

27. AFCP Data Security Model for EHR Data Using Blockchain.

28. Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics.

29. SECURE DIGITAL DATA VISUAL SHARING SCHEMES IN MULTI-OWNER PUBLIC CLOUD ENVIRONMENT APPLICATIONS.

30. A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things.

31. Take back control of your desktop email.

32. Mac 911.

33. THE RACE FOR ADVANCED ENCRYPTION.

35. Windows 11: A guide to the updates.

36. UK orders Apple to open data

37. 6 apps for... Creating & managing documents.

38. Share your location privately.

39. Phone and Tablet Tips.

40. Phone & tablet tips.

41. An adaptive approach for securing patient data in intellectual disability care with 8D Hyperchaotic DNA encryption and IWT.

42. Chameleon-inspired adaptive photoreactive polyurethane films for dynamic secure multidimensional "burn-after-reading" encryption.

43. The luminescence mechanism of two pure organic room temperature phosphorescent isomers, mechanical force detection, 3D modeling, and dynamic data encryption.

44. Vector geographic data commutative encryption and watermarking algorithm based on prediction differences.

45. Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT.

46. A rewritable and shape memory hydrogel doped with fluorescein-functionalized ZIF-8 for information storage and fluorescent anti-counterfeiting.

47. On the number of solutions to a random instance of the permuted kernel problem.

48. SDRG-Net: Secure DR grading network for Real-Time decision support in IoMT environments.

49. A roadmap to fault diagnosis of industrial machines via machine learning: A brief review.

50. Tuning triplet excitons and dynamic afterglow based on host-guest doping.

Catalog

Books, media, physical & digital resources