„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
-
Secure and scalable IoT healthcare with a permissioned blockchain and encryption techniques
-
Data Security and Privacy Protection – Third International Conference, DSPP 2025, Xi'an, China, October 16–18, 2025, Proceedings, Part II
-
LfDI Bremen: 35. Jahresbericht Datenschutz 2012, 7. Jahresbericht Informationsfreiheit 2012
-
Several new classes of MDS symbol-pair codes
-
Secure image transmission in wireless sensor networks using DNA coding and memcapacitor-based hyperchaotic system for encryption and decryption
-
The expectation and the variance of the weights of de Bruijn sequences
-
PayScan: Detection and Security Analysis of Payment Libraries in Android Apps
-
Formal security analysis and improvement based on the ZLL touchlink commissioning protocol
-
Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies
-
Cross-Silo Federated Learning in Security Operations Centers for effective malware detection
-
The impact of cyber threat intelligence (CTI) on employee behavior and skills and the implications for organizational cyber resilience
-
A One-class variational autoencoder for smart contract vulnerability detection
-
Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 27001
-
A formal technique for automatic resolution of OpenFlow anomalies
-
A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant
-
StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding
-
Enhancing software-defined perimeters with integrated identity solutions and threat detection for robust zero trust security
-
CI2P-MedHFDroid: a context-aware individual privacy preferences model for medical, health & fitness android apps
-
A circuit for detecting IoT malware using signatures derived from processor information on LSI