„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Auftragsverarbeitung – Kontrollrechte und -Pflichten
-
EUDI-Wallet und PID – eIDAS 2.0-Verordnung und die digitale Brieftasche
-
Evaluierung und Zertifizierung einer Videosprechstunde – Anwendung des DSGVO – information privacy standard in der Praxis
-
Financial Cryptography and Data Security – FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
An algebraic and chaotic three-layered digital data encryption technique
-
Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies
-
A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol
-
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security
-
Meaningful data encryption scheme based on newly designed chaotic map and P-tensor product compressive sensing in WBANs
-
An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks
-
Cross-domain encryption scheme with equality test for wireless body area networks
-
Robust encryption method based on AES-CBC using elliptic curves Diffie–Hellman to secure data in wireless sensor networks
-
Privacy Technologies and Policy – 13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings
-
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
-
Computer Security – ESORICS 2025 – 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II
-
Computer Security – ESORICS 2025 – 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV
-
Trading Indistinguishability-based Privacy and Utility of Complex Data
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements