„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Digital Forensics and Cyber Crime – Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers
-
Financial Cryptography and Data Security – 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
-
Information and Communication Technology – Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings
-
Digital Forensics and Cyber Crime – 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers
-
Digital Forensics and Watermaking – 11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papers
-
Data Privacy Management and Autonomous Spontaneous Security – 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
-
Communications and Multimedia Security – 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings
-
Financial Cryptography and Data Security – 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers
-
Security and Trust Management – 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers
-
Information Security and Privacy – 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings
-
Data and Applications Security and Privacy XXV – 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
-
Fast Software Encryption – 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004. Revised Papers
-
Advances in Information and Computer Security – 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
-
Enhancing blockchain-based audit data privacy via hybrid chaotic and RSA encryption: mechanism design and performance evaluation
-
Correction to: Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes
-
Correction: Maritime cybersecurity: protecting digital seas
-
Privatsphärenfreundliche Plattformgeschäftsmodelle – Geschäftsmodell-Navigator
-
Privacy by Design for Integrated Case and Care Management: Receiver-Oriented Encryption in STROKE OWL
-
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
-
Crypt4GH-JS: securely storing sensitive data online with client-side encryption