„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
History of Cryptography and Cryptanalysis – Codes, Ciphers, and Their Algorithms
-
Fundamentals of Digital Forensics – Theory, Methods, and Real-Life Applications
-
Pro SQL Server on Linux – Including Container-Based Deployment with Docker and Kubernetes
-
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
-
Firewalls Don't Stop Dragons – A Step-by-Step Guide to Computer Security for Non-Techies
-
Multi-photon Quantum Secure Communication
-
Fundamental Computing Forensics for Africa – A Case Study of the Science in Nigeria
-
Introduction to Security Reduction
-
Steganography Techniques for Digital Images
-
Lattices Applied to Coding for Reliable and Secure Communications
-
Network Security Metrics
-
Guide to Security in SDN and NFV – Challenges, Opportunities, and Applications
-
Deep learning-based user authentication with hybrid encryption for secured blockchain-aided data storage and optimal task offloading in mobile edge computing
-
Divisible design graphs from the symplectic graph
-
The set of pure gaps at several rational places in function fields
-
Several families of negacyclic BCH codes and their duals
-
The weight hierarchies of three classes of linear codes
-
Codes from $$A_m$$ A m -invariant polynomials
-
Fault attacks on multi-prime RSA signatures
-
Fast software encryption – 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016 : revised selected papers