Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 21 - 40 von 73

21

TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture
Benamira, Adrien ; Guérand, Tristan ; Peyrin, Thomas ; et al.

Cryptography and Securit... Artificial Intelligence
Report
22

Learn Quantum Computing with Python and Q# : A Hands-on Approach
Sarah C. Kaiser ; Christopher Grenade ; Sarah C. Kaiser ; et al.

Programming languages (E... Python (Computer program... Quantum computing
E-Book
23

PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining
Rafiei, Majid ; Schnitzler, Alexander ; van der Aalst, Wil M. P.

Computer Science - Crypt...
Report
24

A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework
Walskaar, Ivar ; Tran, Minh Christian ; Catak, Ferhat Ozgur
Cryptography. October, 2023, Vol. 7 Issue 4

Fachzeitschrift
25

Using Cryptography with Images
Implementing Cryptography Using Python® ; page 171-197 ; ISBN 9781119612209 9781119612216

26

Implementing a Key Exchange Protocol Using Isogenies on Elliptic Curves in Python
Schwartzenburg, Thomas
Mathematics Senior Capstone Papers

elliptic curves cryptography Mathematics
Fachzeitschrift
27

Implementation Of The Base64 Algorithm For Text Encryption And Decryption Using The Python Programming Language
Pamungkas, Caroko Aji ; Pratama, Zudha ; Setiarso, Ichwan ; et al.
(JAIS) Journal of Applied Intelligent System; Vol. 9 No. 1 (2024): Journal of Applied Intelligent System; 109-121 ; 2502-9401 ; 2503-0493 ; 10.33633/jais.v9i1

Fachzeitschrift
29

Bridging the Gap between Computer Engineers and Software Developers by Incorporating the PYNQ Platform into a Graduate Course on Embedded System Design Using FPGA.
Parikh, Chirag ; Aldridge, Ryan T.
Proceedings of the ASEE Annual Conference & Exposition. 2018, p1-12. 12p.

COMPUTER engineers COMPUTER software develo... FIELD programmable gate... EMBEDDED computer system... SYSTEMS design
Konferenz
30

Enhancing Elliptic Curve Digital Signature Algorithm (ECDSA) For the Implementation of Digitally Signed Emails
Mikaella Reign Gangoso ; Ma. Corazon Macaraig
International Journal of Progressive Research in Science and Engineering ; Vol. 5 No. 11 (2024): November; 51-53 ; 2582-7898

ECDSA digital signatures email security elliptic curve parameter... invalid curve attacks deterministic nonce
Fachzeitschrift
31

Enhancing the security of IOT enabled systems using light weight hybrid cryptography models.
Bhandiwad, Vinita ; Ragha, Lakshmappa K.
Cluster Computing. Jun2025, Vol. 28 Issue 3, p1-18. 18p.

ENCRYPTION protocols DATA encryption INTERNET security DATA security PROCESS capability
Fachzeitschrift
32

AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.
BABALESHWAR, VIRESH KASHEENATH ; KARADE, SINCHANA ; N., SAKSHI ; et al.
i-Manager's Journal on Electronics Engineering; Mar2024, Vol. 14 Issue 2, p8-12, 5p

CRYPTOGRAPHY PYTHON programming langu... PUBLIC key cryptography DATA encryption ALGORITHMS
Fachzeitschrift
33

A nano-design of image masking and steganography structure based on quantum technology.
Salahov, Huseyn ; Ahmadpour, Seyed-Sajad ; Navimipour, Nima Jafari ; et al.
Journal of Information Security & Applications. Nov2025, Vol. 94, pN.PAG-N.PAG. 1p.

DATA encryption IMAGE encryption QUANTUM computing CRYPTOGRAPHY QUANTUM computers NANOTECHNOLOGY
Fachzeitschrift
34

SageMath: Implementing Secure Key Exchange.
Benson, Deepu
Open Source For You; Nov2025, Vol. 14 Issue 1, p72-74, 3p

PUBLIC key cryptography CRYPTOGRAPHY NUMBER theory MATHEMATICS software DIGITAL signatures FACTORIZATION
Zeitschrift
35

SIMULATION-DRIVEN ASSESSMENT OF CRYPTOGRAPHIC ALGORITHMS FOR RESOURCE-CONSTRAINED INFOCOMMUNICATION NETWORKS.
Laktionov, I. S. ; Hnatushenko, V. V. ; Udovyk, I. M. ; et al.
Scientific Bulletin of National Mining University; 2025, Issue 6, p148-156, 9p

CRYPTOGRAPHY SYMMETRIC-key algorithms INFORMATION technology s... INFORMATION networks DATA encryption COMPUTER networks
Fachzeitschrift
36

APPLIED CRYPTOGRAPHY IN DESIGNING E-LEARNING PLATFORMS.
MIHAILESCU, Marius Iulian ; NITA, Stefania Loredana ; CORNELIU, Pau Valentin
eLearning & Software for Education; 2020, Vol. 2, p179-189, 11p

CRYPTOGRAPHY DATA encryption ENCRYPTION protocols DIGITAL signatures ALGORITHMS MOBILE learning
Konferenz
37

Learn Blockchain by Building One : A Concise Path to Understanding Cryptocurrencies
Daniel van Flymen ; Daniel van Flymen

Capital market Cryptocurrencies Blockchains (Databases) Database management Data structures (Compute... Data encryption (Compute...
E-Book
38

Secure APIs : Design, Build, and Implement
José Haro Peralta ; José Haro Peralta

E-Book
39

Ghidra Software Reverse-Engineering for Beginners : Master the Art of Debugging, From Understanding Code to Mitigating Threats
David Álvarez Pérez ; Ravikant Tiwari ; David Álvarez Pérez ; et al.

Computer security Reverse engineering Open source software
E-Book
40

Python Standard Library by Example, The
Doug Hellmann ; Doug Hellmann

Python (Computer program...
E-Book

Filter