Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 41 - 60 von 73

41

The Hash Function BLAKE
Jean-Philippe Aumasson ; Willi Meier ; Raphael C.-W. Phan ; et al.

Hashing (Computer scienc... Data encryption (Compute...
E-Book
42

[Untitled]
The Pennsylvania State University CiteSeerX Archives
http://warse.org/pdfs/ijacst07322014.pdf.

Key words Cryptography Secret sharing Polynomials Python
Fachzeitschrift
43

A Web-Based Application for the Secure Transfer of NGS data
Odén Österbo, Ina

NGS next generation sequenci... security transfer cryptography AES
Dissertation
44

Dieses Ergebnis kann Gästen nicht angezeigt werden.

46

Dieses Ergebnis kann Gästen nicht angezeigt werden.

47

Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA
Anwar, Nizirwan ; Munawwar, Munawwar ; Abduh, Muhammad ; et al.
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi); Vol 2 No 3 (2018): Desember 2018; 783 - 791 ; 2580-0760

kriptografi enkripsi dekripsi aes256 rsa
Fachzeitschrift
48

Applied cryptography with python
Leka, Hizer ; Leka, Albiona
International Journal of Business and Technology

Cryptography Plaintext Cipher text Encryption Decryption Computer Sciences
Fachzeitschrift
49

Collapse-Based Cryptographic Decryption Using Total Wave Modified Schrödinger Equation (TWMSE)
Lim Kheng Cheong, Larry ; orcid:0009-0005-8911-

TWMSE Collapse Computing Cryptography Quantum-Inspired Algorit... RSA Post-Quantum
Report
50

Applied cryptography with python
Leka, Hizer ; Leka, Albiona
UBT International Conference

Cryptography Plaintext Cipher text Encryption Decryption
Fachzeitschrift
51

Brakerski‐Gentry‐Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using glow‐worm swarm optimization
Suma, M. R. ; Madhumathy, P.
Transactions on Emerging Telecommunications Technologies ; volume 33, issue 12 ; ISSN 2161-3915 2161-3915

Fachzeitschrift
52

BB84 Quantum Encryption Tool Simulator: BB84 Quantum Hybrid Encryption – Prototype v1.1
Hector E Mozo

quantum encryption BB84 protocol hybrid cryptography post-quantum security AES-256 Dilithium2
E-Ressource
53

Conception d'un système de télépaiement à base de la technologie NFC.
MEHDAOUI, Oumaima ; YOUSSEFI, Abdelkader ; MOUHSSEN, Ahmed ; et al.
Colloque sur les Objets et systèmes Connectés ; https://hal.archives-ouvertes.fr/hal-02296387 ; Colloque sur les Objets et systèmes Connectés, Ecole Supérieure de Technologie de Casablanca (Maroc), Institut Universitaire de Technologie d'Aix-Marseille (France), Jun 2019, CASABLANCA, Maroc

CASABLANCA Morocco connected objects NFC protocol RASBERR PI objets connectés
Konferenz
54

A Review of Open-Source Fully Homomorphic Encryption Libraries: Zama.ai Concrete Compiler, Applications and Vulnerability
Benedict , D.A ; Giwa, T.A ; Usman, O.L ; et al.
University of Ibadan Journal of Science and Logics in ICT Research; Vol. 11 No. 2 (2024): Journal of Science and Logics in ICT Research; 24-35

Fully Homomorphic Encryp... Zama.ai Concrete Compile... Machine Learning Security Opensource Library
Fachzeitschrift
55

Enhancing security efficiency through the integration of Elliptic Curve Cryptography with Audio Steganography
Bhosale, Nishant Sandeep

Electronic computers. Co... Computer algorithms Computer Security
Dissertation
56

Lattice-Based Cryptography for Privacy Preserving Machine Learning
Walskaar, Ivar ; Tran, Minh Christian ; Catak, Ferhat Özgur

Dissertation
57

Votechain, uma solução mais segura, acessível e inovadora para as eleições, implementada com a tecnologia Blockchain ; Votechain, a safer, more accessible and innovative election solution, implemented with Blockchain technology
Sousa, Thúlio Mattheus Pereira de ; Viegas, Carlos Manuel Dias ; Silva, Sérgio Natan ; et al.

Blockchain Eleições Criptografia Segurança de Redes Elections Cryptography
Dissertation
58

Digital Authentication for Official Bulk Email
Slack, Andrew A. ; NAVAL POSTGRADUATE SCHOOL MONTEREY CA
DTIC

Cybernetics ELECTRONIC MAIL ELECTRONIC SECURITY INTERNET CRYPTOGRAPHY DIGITAL SYSTEMS
Fachzeitschrift
60

The Hash Function BLAKE
Aumasson, Jean-Philippe, author. ; Henzen, Luca, author. ; Phan, Raphael C.-W, author. ; et al.

Computer science. Data encryption (Compute... Data protection. Computer software. Data Encryption. Systems and Data Securit...
Buch

Filter