„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
ICT Systems Security and Privacy Protection – 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
-
Reconfigurable Cryptographic Processor
-
Random Numbers and Computers
-
Fault Tolerant Architectures for Cryptography and Hardware Security
-
Enterprise Cybersecurity Study Guide – How to Build a Successful Cyberdefense Program Against Advanced Threats
-
Animal Biometrics – Techniques and Applications
-
On the vector subspaces of $$\mathbb {F}_{2^n}$$ F 2 n over which the multiplicative inverse function sums to zero
-
Practical Post-Quantum Signatures – FALCON and SOLMAE with Python
-
Proceedings of International Conference on Network Security and Blockchain Technology – ICNSBT 2024
-
Low-weight codewords in cyclic codes
-
The support designs of several families of lifted linear codes
-
Digital Privacy and Security Using Windows – A Practical Guide
-
Blockchain Basics – A Non-Technical Introduction in 25 Steps
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems I
-
Beginning Ethical Hacking with Python
-
NTP Security – A Quick-Start Guide
-
iOS Penetration Testing – A Definitive Guide to iOS Security
-
A class of permutations on $${\mathbb {Z}}_{p}$$ Z p with differential uniformity at most 3
-
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case
-
From Hacking to Report Writing – An Introduction to Security and Penetration Testing