Search

Your search keyword '"data security"' showing total 197,783 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security"
197,783 results on '"data security"'

Search Results

151. Data Hiding Scheme for Spatial Domain Images Using Fuzzy Logic and Modulus Operation.

152. Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images

153. Digital transformation: Artificial intelligence shaping the future of public sector

154. A Comprehensive Framework for Harnessing IoT and 5G for Enhanced Disaster Response

155. Harnessing Federated Learning for Secure Data Sharing in Healthcare Systems

156. Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption

157. Unlocking the potential of precision agriculture for sustainable farming

158. A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION

159. Predictive manufacturing: State of the art, design standards, limitations, challenges, and future perspectives.

160. Blockchain-enhanced sensing as a service for smart supply chains: A decentralized IoT framework.

161. Case studies of challenges in IoT implementation in Thailand.

162. Secure archiving system: Integrating object information with document images using mathematical coding techniques.

163. Securing IoT healthcare platform with lightweight encryption.

164. Federated learning in healthcare: A systematic review of evolution from traditional paper records.

165. The blockchain technology revolution in secure multimedia content: A review.

166. A comprehensive review on S-box generation methods.

167. A non-redundant cost-effective platform and data security in cloud computing using improved lightweight standalone framework over data encryption standard algorithm.

168. A novel on comparative data security analysis in public auditing for trusted cloud service with SSL encryption over RSA algorithm.

169. Enhancing data security in cloud using artificial neural network with backward propagation.

170. SafeBudget: Security enhanced application for budget tracking using cryptographic key exchange.

171. Exploring the impact of cloud and edge computing in education: Addressing challenges and unveiling opportunities.

172. Design of a mathematical fusion model for enhanced cloud data security.

173. Boost your VPN Privacy

174. DSpace 7 Benefits: Is It Worth Upgrading?

175. How Digital Trust Varies Around the World.

176. Customer Data: Designing for Transparency and Trust.

178. State of the 2024 LIS market.

179. ALARMED and ALARMING: Teaching Patrons How to Spot Celebrity Impostors.

180. Enhancing image data security with chain and non-chain Galois ring structures.

181. LIFESTYLE INTEGRATION, BODY SKIN AI, GAMIFICATION, DATA SECURITY AND MORE: DIGITAL TECH TO MOVE BEAUTY FORWARD.

182. Speakers, vacuums, doorbells and fridges - the government plans to make your 'smart things' more secure.

183. TACTICAL RADIOS LISTINGS.

186. Secured and cloud-based electronic health records by homomorphic encryption algorithm.

187. AFCP Data Security Model for EHR Data Using Blockchain.

188. IoTBlockFin: A Solution to Prevent Loan Scams in India with Integrating IoT and Blockchain for Enhanced Security and Transparency in Loan Processing.

189. The Integration and Implementation of the Healthcare Internet of Things and Its Comprehensive Analysis.

190. How to Hit the Moving Target of Medical Device Cybersecurity: Metaphoric archers may also be challenged to extend their skills when it comes to predicate comparisons for cyber devices

191. The Cost of Cybersecurity in Medtech: Who will ultimately pay for the cybersecurity requirements that loom over the industry?

192. QIoTChain: Quantum IoT‐blockchain fusion for advanced data protection in Industry 4.0

193. Privacy Awareness and Social Media: Personal Data Protection among Facebook** and Instagram** Users

194. Legal Regulation of Cross-border Flow of Health Data in Australia and Its Implications for China

195. Research on multi-party security collaborative linear regression for computing power networks

196. Innovation and challenges of artificial intelligence technology in personalized healthcare

197. Elicitation of security threats and vulnerabilities in Insurance chatbots using STRIDE

198. Evaluation of security framework for BYOD device in cloud environment

200. Cybersecurity in der Lieferkette Wie Sie Ihre Software-Supply-Chain schützen

Catalog

Books, media, physical & digital resources