Search

Your search keyword '"DATA encryption"' showing total 30,077 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption"
30,077 results on '"DATA encryption"'

Search Results

1. Confidential Container Groups.

2. Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil.

3. Device Onboarding Using FDO and the Untrusted Installer Model.

4. Indistinguishability Obfuscation from Well-Founded Assumptions.

6. Convergence of Blockchain and Iot

7. Hardware VM Isolation in the Cloud.

8. Pathway-directed recyclable chirality inversion of coordinated supramolecular polymers.

9. Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis.

10. Intelligent privacy‐preserving data management framework for medicine supply chain system.

11. Full‐Phase Parameter Modulation with Arbitrary Polarization Combination via Bidirectional Asymmetric Transmission Meta‐Devices.

12. Bi3+/Eu3+ Co‐Activated Multimode Anti‐Counterfeiting Material with White Light Emission and Orange‐Yellow Persistent Luminescence.

13. Photochemical Patterning and Characterization of Mechanical Properties on Soft Materials.

14. A local encryption method for large-scale vector maps based on spatial hierarchical index and 4D hyperchaotic system.

15. Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system.

16. High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform.

17. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing.

18. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.

19. Enhancing the SRAM PUF with an XOR Gate.

20. Privacy‐preserving data aggregation achieving completeness of data queries in smart grid.

21. A Blockchain and Zero Knowledge Proof Based Data Security Transaction Method in Distributed Computing.

22. Encrypted Data Reduction: Removing Redundancy from Encrypted Data in Outsourced Storage.

23. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

24. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

25. Elliptic Curve Cryptography and Password Based Key Derivation Function with Advanced Encryption Standard Method for Cloud Data Security.

26. Decentralized CP-ABE Scheme for Enhanced University Data Security Using Blockchain.

27. Polarization‐Sensitive Artificial Optoelectronic Synapse Based on Anisotropic β‐Ga2O3 Single Crystal for Neuromorphic Vision Systems and Information Encryption.

28. Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network.

29. Fully 2D Materials‐Based Resistive Switching Circuits for Advanced Data Encryption.

30. Improved RSA with Enhanced Security on STM32 @ 84MHz.

31. A novel lossless commutative encryption and watermarking algorithm for vector geographic dataset.

32. A milestone in encryption control – what sank the US key-escrow policy?

33. Multicolor Anti‐counterfeiting Strategy and Synchronous High Capacity Storage Based on Acidochromic Organic Fluorescent Materials.

34. An encrypted deduplication scheme based on files diversity.

35. A Novel Citadel Security Framework for Cyber Data using CryptSteg Techniques.

37. Advancing Security: A Novel Approach with Linear Bézier Curve in Menezes-Vanstone Elliptic Curve Cryptosystem.

38. A Compressive Study on Security and Privacy Issues in IoT.

39. Factorial Numbers and Their Practical Applications.

40. Information security for criminological ethnographers.

41. Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications.

42. NCBI Medical Data Encryption with Lossless DNA Compression.

43. Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption.

44. Secure Virtual Machine Migration and Host Overload Detection Using Modified Pelican Optimization with Variable Load Mean Function.

45. Beyond neural data: Cognitive biometrics and mental privacy.

46. High‐Capacity Photochromic Rotary Encoder for Information Encryption and Storage.

47. Technical principles and protocols of encryption and their significance and effects on technology regulation.

48. Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks.

49. Efficient Secure Mechanisms for In-Vehicle Ethernet in Autonomous Vehicles.

50. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment.

Catalog

Books, media, physical & digital resources