„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Security of fixed-weight repetitions of special-sound multi-round interactive proofs
-
Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience
-
Distributed repair schemes for Reed–Solomon codes with multiple erasures
-
Subgroup perfect codes in lie type simple groups of rank one
-
On binary codes with distances d and $$d+2$$ d + 2
-
xT-STRIDE threat model for unmanned air vehicle security
-
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter
-
Digital sovereignty in practice: analyzing the EU’s NIS2 directive
-
Construction of network pentest-defense adversarial environment based on NASim
-
On the treewidth of generalized q-Kneser graphs
-
Unbiased weighing matrices of weight 9
-
MF2S-CID: A dynamic multi-model framework for scalable and interpretable intrusion detection
-
Round and Computational Efficiency of Multi-party Protocols
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part III
-
Digital fixes and techno-solutionism: The EU’s tech-based battle against child sexual abuse
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part V
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VIII
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part IV
-
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
-
Quantum proof biometric authentication framework using binary lattices and homomorphic encryption for secure cancelable templates