Full-text articles, eBooks and much more from EBSCO Discovery Service

Not found what you are looking for? Check in Onleihe or make a Purchase Request

Showing 1 - 20 of 73

1

Implementing Cryptography Using Python
Shannon W. Bray ; Shannon W. Bray

Python (Computer program... Data encryption (Compute...
E-Book
Save to List
2

Advanced IoT Intrusion Detection for Intelligent Homes using Optimized Cross-Contextual Transformers with a Dynamic City Game Framework
Muthulingam, Gurusigaamani Ayyanar ; Dhasmana, Gulshan ; Purushothaman, S. ; et al.
2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2024 8th International Conference on. :130-136 Oct, 2024

Conference
Save to List
3

Implementing Cryptography Using Python®
Bray, Shannon W.
ISBN 9781119612209 9781119612216.

Book
Save to List
4

Post Quantum Computing Cryptography Key Generation: An Lenstra-Lenstra-Lovasz (LLL) Approach
Subramanian, J Harihara ; Nagaraja, K.V. ; Belwal, Meena
2025 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) Advancements in Smart, Secure and Intelligent Computing (ASSIC), 2025 International Conference on. :1-6 May, 2025

Conference
Save to List
5

ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON
Cintas-Canto, Alvaro ; Kaur, Jasmin ; Mozaffari-Kermani, Mehran ; et al.

Computer Science - Crypt...
Report
Save to List
6

Performing Classical and Post-Quantum Cryptography on IoT Data: An Evaluation.
Rawal, Darshana ; Seedorf, Jan ; Jha, Nikhil
International Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences; 2025, Vol. 48 Issue 4/W16, p91-97, 7p

INTERNET of things CRYPTOGRAPHY SECURITY systems RESOURCE allocation RASPBERRY Pi COMPUTER performance
Academic journal
Save to List
7

Beyond encryption: How deep learning can break microcontroller security through power analysis
Negabi, Ismail ; Ait El Asri, Smail ; El Adib, Samir ; et al.
In e-Prime - Advances in Electrical Engineering, Electronics and Energy March 2025 11

Academic journal
Save to List
8

Performing Classical and Post-Quantum Cryptography on IoT Data: An Evaluation
D. Rawal ; J. Seedorf ; N. Jha
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLVIII-4-W16-2025, Pp 91-97 (2025)

Technology Engineering (General). C... TA1-2040 Applied optics. Photonic... TA1501-1820
Academic journal
Save to List
9

Implementation of cryptographic algorithm for secured communication in tamil language using python program.
Prabu, M. Vivek ; Karthika, R.
AIP Conference Proceedings. 2023, Vol. 2718 Issue 1, p1-11. 11p.

CAESAR, Julius, 100 B.C.... PYTHON programming langu... PROGRAMMING languages ALGORITHMS LINGUISTIC complexity CRYPTOCURRENCIES
Conference
Save to List
10

D3p -- A Python Package for Differentially-Private Probabilistic Programming
Prediger, Lukas ; Loppi, Niki ; Kaski, Samuel ; et al.
Proceedings on Privacy Enhancing Technologies, 2022(2), 407-425

Computer Science - Machi... Computer Science - Crypt... Statistics - Machine Lea...
Report
Save to List
14

Improve Blockchain Performance using Graph Data Structure and Parallel Mining
Kan, Jia ; Chen, Shangzhe ; Huang, Xin

Computer Science - Crypt... Computer Science - Distr...
Report
Save to List
15

Implementing Zero-Knowledge Authentication with Zero Knowledge (ZKA•wzk).
Python Papers; Nov2010, Vol. 5 Issue 3, p1-19, 19p, 17 Diagrams, 3 Charts

LEGAL authentication sof... CRYPTOGRAPHY PYTHON programming langu... DATA encryption COMPUTER network protoco... COMPUTER security softwa...
Academic journal
Save to List
17

Implementation of a Secure LoRaWAN System for Industrial Internet of Things Integrated With IPFS and Blockchain
Shahjalal, M. ; Islam, M.M. ; Alam, M.M. ; et al.
IEEE Systems Journal Systems Journal, IEEE. 16(4):5455-5464 Dec, 2022

Academic journal
Save to List
18

Implementing Zero-Knowledge Authentication with Zero Knowledge (ZKA•wzk).
Brandon Lum Jia Jun
Python Papers Monograph; 2010, Vol. 2, p1-19, 19p, 6 Diagrams, 2 Charts

PYTHON programming langu... PROGRAMMING languages CRYPTOGRAPHY DATA encryption
Academic journal
Save to List
19

This result is not available to guest users.

20

Evaluating the Usability of Differential Privacy Tools with Data Practitioners
Ngong, Ivoline C. ; Stenger, Brad ; Near, Joseph P. ; et al.

Computer Science - Human... Computer Science - Crypt...
Report
Save to List

Filter