Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 1 - 20 von 73

1

Implementing Cryptography Using Python
Shannon W. Bray ; Shannon W. Bray

Python (Computer program... Data encryption (Compute...
E-Book
2

Advanced IoT Intrusion Detection for Intelligent Homes using Optimized Cross-Contextual Transformers with a Dynamic City Game Framework
Muthulingam, Gurusigaamani Ayyanar ; Dhasmana, Gulshan ; Purushothaman, S. ; et al.
2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2024 8th International Conference on. :130-136 Oct, 2024

Konferenz
3

Implementing Cryptography Using Python®
Bray, Shannon W.
ISBN 9781119612209 9781119612216.

Buch
4

Post Quantum Computing Cryptography Key Generation: An Lenstra-Lenstra-Lovasz (LLL) Approach
Subramanian, J Harihara ; Nagaraja, K.V. ; Belwal, Meena
2025 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) Advancements in Smart, Secure and Intelligent Computing (ASSIC), 2025 International Conference on. :1-6 May, 2025

Konferenz
5

ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON
Cintas-Canto, Alvaro ; Kaur, Jasmin ; Mozaffari-Kermani, Mehran ; et al.

Computer Science - Crypt...
Report
6

Performing Classical and Post-Quantum Cryptography on IoT Data: An Evaluation.
Rawal, Darshana ; Seedorf, Jan ; Jha, Nikhil
International Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences; 2025, Vol. 48 Issue 4/W16, p91-97, 7p

INTERNET of things CRYPTOGRAPHY SECURITY systems RESOURCE allocation RASPBERRY Pi COMPUTER performance
Fachzeitschrift
7

Beyond encryption: How deep learning can break microcontroller security through power analysis
Negabi, Ismail ; Ait El Asri, Smail ; El Adib, Samir ; et al.
In e-Prime - Advances in Electrical Engineering, Electronics and Energy March 2025 11

Fachzeitschrift
8

Performing Classical and Post-Quantum Cryptography on IoT Data: An Evaluation
D. Rawal ; J. Seedorf ; N. Jha
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLVIII-4-W16-2025, Pp 91-97 (2025)

Technology Engineering (General). C... TA1-2040 Applied optics. Photonic... TA1501-1820
Fachzeitschrift
9

Implementation of cryptographic algorithm for secured communication in tamil language using python program.
Prabu, M. Vivek ; Karthika, R.
AIP Conference Proceedings. 2023, Vol. 2718 Issue 1, p1-11. 11p.

CAESAR, Julius, 100 B.C.... PYTHON programming langu... PROGRAMMING languages ALGORITHMS LINGUISTIC complexity CRYPTOCURRENCIES
Konferenz
10

D3p -- A Python Package for Differentially-Private Probabilistic Programming
Prediger, Lukas ; Loppi, Niki ; Kaski, Samuel ; et al.
Proceedings on Privacy Enhancing Technologies, 2022(2), 407-425

Computer Science - Machi... Computer Science - Crypt... Statistics - Machine Lea...
Report
14

Improve Blockchain Performance using Graph Data Structure and Parallel Mining
Kan, Jia ; Chen, Shangzhe ; Huang, Xin

Computer Science - Crypt... Computer Science - Distr...
Report
15

Implementing Zero-Knowledge Authentication with Zero Knowledge (ZKA•wzk).
Python Papers; Nov2010, Vol. 5 Issue 3, p1-19, 19p, 17 Diagrams, 3 Charts

LEGAL authentication sof... CRYPTOGRAPHY PYTHON programming langu... DATA encryption COMPUTER network protoco... COMPUTER security softwa...
Fachzeitschrift
17

Implementation of a Secure LoRaWAN System for Industrial Internet of Things Integrated With IPFS and Blockchain
Shahjalal, M. ; Islam, M.M. ; Alam, M.M. ; et al.
IEEE Systems Journal Systems Journal, IEEE. 16(4):5455-5464 Dec, 2022

Fachzeitschrift
18

Implementing Zero-Knowledge Authentication with Zero Knowledge (ZKA•wzk).
Brandon Lum Jia Jun
Python Papers Monograph; 2010, Vol. 2, p1-19, 19p, 6 Diagrams, 2 Charts

PYTHON programming langu... PROGRAMMING languages CRYPTOGRAPHY DATA encryption
Fachzeitschrift
19

Dieses Ergebnis kann Gästen nicht angezeigt werden.

20

Evaluating the Usability of Differential Privacy Tools with Data Practitioners
Ngong, Ivoline C. ; Stenger, Brad ; Near, Joseph P. ; et al.

Computer Science - Human... Computer Science - Crypt...
Report

Filter