Full-text articles, eBooks and much more from EBSCO Discovery Service

Not found what you are looking for? Check in Onleihe or make a Purchase Request

Showing 1 - 20 of 4,160

1

Aggregating digital identities through bridging : an integration of open authentication protocols for Web3 identifiers ; An integration of open authentication protocols for Web3 identifiers
Biedermann, Ben ; Scerri, Matthew ; Kozlova, Victoria ; et al.

Blockchains (Databases) Database security Data encryption (Compute... Online identities Computer networks -- Sec...
Academic journal
Save to List
2

Multiplane experimental optical data encryption using phase only holography
González Moncada, Juan Andrés ; Vélez Zea, Alejandro ; Barrera Ramírez, John Fredy ; et al.

Simulación por Computado... Computer Simulation Procesamiento óptico de... Optical data processing Holografía Holography
Academic journal
Save to List
3

Public key protocols from twisted-skew group rings
Cruz, Javier de la ; Martínez Moro, Edgar ; Muñoz Ruiz, Steven ; et al.

Group rings Anillos (Algebra) Public key cryptography Data encryption (Compute... Cryptography Criptografía
Academic journal
Save to List
4

Security in Computer and Information Sciences
Gelenbe, Erol ; Campegiani, Paolo ; Czachórski, Tadeusz ; et al.

Computer science Data protection Application software Data encryption (Compute... Special purpose computer... Computer communication s...
E-Book
Save to List
5

Image watermarking using least significant bit and Canny edge detection
Faheem, Zaid Bin ; Ishaq, Abid ; Rustam, Furqan ; et al.

Substitution box Watermarks - Technologic... Digital images - Waterma... Cryptography Data encryption (Compute... Criptografía
Academic journal
Save to List
6

Blockchain-based patient-driven Inter-OperableModel for healthcare 5.0 system
Shah, Kaushal ; Garg, Lalit ; Kachoria, Divam ; et al.

Blockchains (Databases) Data encryption (Compute... Medical care Ethereum (Databases)
Academic journal
Save to List
7

SoK: differentially private publication of trajectory data
Miranda Pascual, Àlex ; Guerra Balboa, Patricia ; Parra Arnau, Javier ; et al.

Àrees temàtiques de la U... Àrees temàtiques de la U... Machine learning Data protection Data encryption (Compute... Systematization of knowl...
Academic journal
Save to List
8

Nonlinear encryption for multiple images based on a joint transform correlator and the Gyrator transform
Pérez, Ronal A ; Vilardy Ortiz, Juan Manuel ; Pérez Cabré, Elisabet ; et al.

Àrees temàtiques de la U... Nonlinear systems Image processing Data encryption (Compute... Optical multiple-image e... Joint transform correlat...
Academic journal
Save to List
9

Double image encryption system using a nonlinear joint transform correlator in the Fourier domain
Pérez, Ronal A ; Pérez Cabré, Elisabet ; Vilardy Ortiz, Juan Manuel ; et al.

Àrees temàtiques de la U... Fourier transformations Data encryption (Compute... Deep learning (Machine l... Double image encryption Joint transform correlat...
Academic journal
Save to List
10

Algorithmic problems of group theory, their complexity, and applications to cryptography
Kahrobaei, Delaram, 1975- editor. ; Shpilrain, Vladimir, 1960- editor.

Group theory -- Congress... Noncommutative algebras... Algorithms -- Congresses... Cryptography -- Congress... Data encryption (Compute... Algebra -- Congresses.
Book
Save to List
11

Encryption made simple for lawyers
Ries, David G., 1949- author. ; Nelson, Sharon D., author. ; Simek, John W., author. ; et al.

Data encryption (Compute... Computers -- Access cont... Lawyers -- United States... Data encryption (Compute... Computers -- Access cont... Handbooks and manuals.
Book
Save to List
12

Medenî muhakeme hukukunda elektronik imzalı belgelerin delil niteliği
Elektronik imzalı belgelerin delil niteliği
Elektronik imzalı belgelerin delil niteliği

Acar, Ayşe Ece, 1988- author. ; Acar, Ayşe Ece, 1988- author.

Turkey. Digital signatures -- La... Electronic records -- La... Signature (Law) -- Turke... Data encryption (Compute... Data protection -- Law a...
Book
Save to List
13

Electronic signatures in law
Mason, Stephen (Barrister) ; Mason, Stephen (Barrister)

Digital signatures -- La... Contracts -- Great Brita... Data encryption (Compute... Digital signatures -- La... Contracts -- Automation. Data encryption (Compute...
Book
Save to List
14

Cyber law: Indian & international perspectives on key topics including data security, e-commerce, cloud computing and cyber crimes
Viswanathan, Aparna. ; Viswanathan, Aparna.

India. Information technology -... Computers -- Law and leg... Internet -- Law and legi... Cyberterrorism -- India... Cyberterrorism -- Preven...
Book
Save to List
15

LPsec: a fast and secure cryptographic system for optical connections
Iqbal, Masab ; Velasco Esteban, Luis Domingo ; Costa, Nelson ; et al.

Àrees temàtiques de la U... Àrees temàtiques de la U... Data encryption (Compute... Computer network protoco... Computer networks -- Sec... Ciphers
Academic journal
Save to List
16

Current and projected national security threats to the United States: hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fourteenth Congress, second session, Tuesday, February 9, 2016.
United States. Congress. Senate. Select Committee on Intelligence, author. ; United States. Congress. Senate. Select Committee on Intelligence, author.

IS (Organization) National security -- Uni... Terrorism -- United Stat... Intelligence service --... Terrorism -- Technologic... Data encryption (Compute...
Book
Save to List
17

Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers
Preneel, Bart., editor. ; Grossklags, Jens, editor.

Electronic commerce. Data encryption (Compute... Computer networks. Computer science. Computer security. Application software.
Book
Save to List
18

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I
Suriadi, Suriadi, editor. ; Pieprzyk, Josef, editor.

Data encryption (Compute... Computer science. Computer security. Algorithms. Computers and civilizati... Management information s...
Book
Save to List
19

ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
Martinelli, Fabio, editor. ; De Capitani di Vimercati, Sabrina, editor.

Information Systems Appl... Data encryption (Compute... Computer science. Computer security. Application software. Computers and civilizati...
Book
Save to List
20

Risk Assessment and Risk-Driven Quality Assurance: 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers
Seehusen, Fredrik, editor. ; Felderer, Michael, editor. ; Großmann, Jürgen, editor.

Data encryption (Compute... Computer networks. Computer science. Microprogramming. Software engineering. Computer security.
Book
Save to List

Filter