Search

Your search keyword '"DATA encryption"' showing total 2,502 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic algorithm analysis and problem complexity Remove constraint Topic: algorithm analysis and problem complexity
2,502 results on '"DATA encryption"'

Search Results

1. Introduction.

2. Experimental Hardware for Coating PUFs and Optical PUFs.

3. Controlled Physical Random Functions.

4. Anti-Counterfeiting.

5. Secure Key Storage with PUFs.

6. On the Amount of Entropy in PUFs.

7. Entropy Estimation for Optical PUFs Based on Context-Tree Weighting Methods.

8. Protection of Biometric Information.

9. Privacy Enhancements for Inexact Biometric Templates.

10. Computationally Secure Authentication with Noisy Data.

11. Fuzzy Identities and Attribute-Based Encryption.

12. Unconditionally Secure Multiparty Computation from Noisy Resources.

13. Robust and Reusable Fuzzy Extractors.

14. Fuzzy Extractors.

15. A Communication-Theoretical View on Secret Extraction.

16. Fuzzy Commitment.

17. Unbreakable Keys from Random Noise.

18. Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones.

19. Risk & Distortion Based K-Anonymity.

20. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.

21. Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.

22. A Compositional Multiple Policies Operating System Security Model.

23. ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.

24. Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.

25. Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.

26. Authorization Constraints Specification of RBAC.

27. On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.

28. Detecting Motifs in System Call Sequences.

29. Security Analysis of MISTY1.

30. Efficient Implementation of the Pairing on Mobilephones Using BREW.

31. Breaking 104 Bit WEP in Less Than 60 Seconds.

32. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.

33. A Generic Method for Secure SBox Implementation.

34. An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.

35. Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.

36. A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.

37. Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.

38. Implementation of LSM-Based RBAC Module for Embedded System.

39. Geometrically Invariant Image Watermarking in the DWT Domain.

40. Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.

41. Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.

42. Secret Signatures: How to Achieve Business Privacy Efficiently?

43. Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.

44. Universal ηT Pairing Algorithm over Arbitrary Extension Degree.

45. Drive-By Pharming.

46. Application of the PageRank Algorithm to Alarm Graphs.

47. Firewall for Dynamic IP Address in Mobile IPv6.

48. DDoS Attack Detection Algorithms Based on Entropy Computing.

49. Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.

50. Detection and Diagnosis of Control Interception.

Catalog

Books, media, physical & digital resources