Search

Your search keyword '"DATA encryption"' showing total 671 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Publisher taylor & francis ltd Remove constraint Publisher: taylor & francis ltd
671 results on '"DATA encryption"'

Search Results

1. A local encryption method for large-scale vector maps based on spatial hierarchical index and 4D hyperchaotic system.

2. A milestone in encryption control – what sank the US key-escrow policy?

3. Technical principles and protocols of encryption and their significance and effects on technology regulation.

4. A randomized encryption algorithm for the MPEG-DASH digital rights management.

5. A Structured Lightweight Encryption Architecture for Data Protection in IoT.

6. FFBP Neural Network Optimized with Woodpecker Mating Algorithm for Dynamic Cluster-based Secure Routing in WSN.

7. APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization.

8. Sparse Compression-Based Image Encryption using Data Encryption Standards RC5.

9. A novel AES–DES with improved Cheetah optimisation algorithm for secured medical data transmission in cloud environment.

10. An Evaluation of the User Experience and Privacy Concerns of Individuals Misusing Opioids Using a Location Tracking Mobile Application.

11. Novel hybrid chaotic map-based secure data transmission between smart meter and HAN devices.

12. Optimization of data packet encryption algorithm in network link transport layer.

13. Alkaline: A Simplified Post-Quantum Encryption Algorithm for Classroom Use.

14. A learning analytics perspective on educational escape rooms.

15. Homomorphism on bipolar-valued fuzzy sub-bigroup of a bigroup for secured data transmission over WSN.

16. Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm.

17. A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data.

18. ATCA Multi-Node Management System Protocol Optimization.

19. DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot.

20. Security risks of chatbots in customer service: a comprehensive literature review.

21. Confidentiality attacks against encrypted control systems.

22. Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption.

23. SEEDDUP: A Three-Tier SEcurE Data DedUPlication Architecture-Based Storage and Retrieval for Cross-Domains Over Cloud.

24. Walsh Scalar Miyaguchi Preneel Cryptography for Secure Image Compression and Storage in WANET.

25. Big Data analytics for privacy through ND-homomorphic encryption.

26. Blockchain architecture and its applications in a bank risk mitigation framework.

27. Social conceptions versus legal protections of privacy and information security in the context of encryption.

28. Cypherpunk ideology: objectives, profiles, and influences (1992–1998).

29. MULTI-KEY FULLY HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVATION WITHIN FEDERATED LEARNING ENVIRONMENTS.

30. Europol and cybercrime: Europol's sharing decryption platform.

31. Encryption laws and regulations in one of the Five Eyes: the case of New Zealand.

32. Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties: By Ksenia Ermoshina and Francesca Musiani, Manchester, UK: Mattering Press, 2022, 272 pp., ISBN 9781912729227, £16.00.

33. Development and design of an FPGA-based encoder for NPN.

34. New method for improving add round key in the advanced encryption standard algorithm.

35. A machine learning-based analytical framework for employee turnover prediction.

36. Exposing Android social applications: linking data leakage to privacy policies.

37. A novel modified KASUMI block chiper for global system for mobile communications.

38. A LIGHTWEIGHT WHATSAPP END-TO-END ENCRYPTION.

39. Heeding the Signals: Applying Web best Practices when Google recommends.

40. Ethics, Encryption, and Evolving Concepts of Personal Privacy in the 'Black Box Library'.

41. Leveraging the power of quantum computing for breaking RSA encryption.

42. Reversible Data Hiding in Encrypted Images Based on Hybrid Cryptosystem.

43. Cyber-diplomacy: cyberwarfare and the rules of engagement.

44. Protecting financial transactions through networks and point of sales.

45. Improved KASUMI block cipher for GSM-based mobile networks.

46. Efficient data encryption technique using quaternions for wireless sensor network.

47. Deniable authenticated encryption for e-mail applications.

48. An efficient approach for enhancing security in Internet of Things using the optimum authentication key.

49. A lightweight privacy-preserving data aggregation scheme with provable security for internet-of-things.

50. Smart system to create an optimal higher education environment using IDA and IOTs.

Catalog

Books, media, physical & digital resources