Works matching DE "DATA encryption software"
1
- Issues in Science & Technology, 1999, v. 15, n. 3, p. 23
- Article
3
- Journal of Supercomputing, 2012, v. 61, n. 3, p. 642, doi. 10.1007/s11227-011-0627-z
- Chang, Weng-Long;
- Lin, Kawuu;
- Chen, Ju-Chin;
- Wang, Chih-Chiang;
- Lu, Lai;
- Guo, Minyi;
- Ho, Michael
- Article
4
- Psychiatric Times, 2010, v. 27, n. 2, p. 18
- Seemsn, Mary V.;
- Seeman, Marc;
- Seeman, Bob;
- Seeman, Neil
- Article
5
- Information Systems Management, 1997, v. 14, n. 1, p. 41, doi. 10.1080/10580539708907029
- Garfield, Monica J.;
- McKeown, Patrick G.
- Article
6
- Regent University Law Review, 2019, v. 32, n. 1, p. 111
- Article
7
- Wireless Networks (10220038), 2012, v. 18, n. 2, p. 113, doi. 10.1007/s11276-011-0390-3
- Pan, Miao;
- Zhu, Xiaoyan;
- Fang, Yuguang
- Article
8
- VIDHIGYA: The Journal of Legal Awareness, 2013, v. 8, n. 1, p. 1
- Article
9
- Marquette Intellectual Property Law Review, 2012, v. 16, n. 2, p. 483
- Article
10
- Multimedia Tools & Applications, 2012, v. 57, n. 3, p. 453, doi. 10.1007/s11042-010-0644-6
- Yang, Hong-ying;
- Bao, De-wang;
- Wang, Xiang-yang;
- Niu, Pan-pan
- Article
11
- Multimedia Tools & Applications, 2012, v. 56, n. 2, p. 315, doi. 10.1007/s11042-010-0652-6
- Sam, I.;
- Devaraj, P.;
- Bhuvaneswaran, Raghuvel
- Article
12
- Nature, 1997, v. 388, n. 6639, p. 217, doi. 10.1038/40724
- Article
13
- Journal of Information Science & Engineering, 2012, v. 28, n. 4, p. 739
- Han-Yu Lin;
- Tzong-Sun Wu;
- Shih-Kun Huang
- Article
14
- Nature, 2001, v. 413, n. 6858, p. 766, doi. 10.1038/35101752
- Article
15
- Journal of Cryptology, 2012, v. 25, n. 3, p. 528, doi. 10.1007/s00145-011-9103-4
- Kawachi, Akinori;
- Koshiba, Takeshi;
- Nishimura, Harumichi;
- Yamakami, Tomoyuki
- Article
16
- European Sociological Review, 2017, v. 33, n. 6, p. 752, doi. 10.1093/esr/jcx072
- Przepiorka, Wojtek;
- Norbutas, Lukas;
- Corten, Rense
- Article
17
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4724815
- Ou, Lu;
- Yin, Hui;
- Qin, Zheng;
- Xiao, Sheng;
- Yang, Guangyi;
- Hu, Yupeng
- Article
18
- International Review on Computers & Software, 2011, v. 6, n. 1, p. 96
- Aslan, Füsun Yavuzer;
- Sakallı, M. Tolga;
- Aslan, Bora;
- Bulut, Selma
- Article
19
- International Review on Computers & Software, 2011, v. 6, n. 1, p. 40
- Jolfaei, Alireza;
- Mirghadri, Abdolrasoul
- Article
20
- University of Michigan Journal of Law Reform, 2017, v. 50, n. 2, p. 489, doi. 10.36646/mjlr.50.2.shedding
- Article
21
- Judges' Journal, 2014, v. 53, n. 4, p. 11
- Article
22
- Bioinformatics, 2019, v. 35, n. 1, p. 146, doi. 10.1093/bioinformatics/bty645
- Hosseini, Morteza;
- Pratas, Diogo;
- Pinho, Armando J
- Article
23
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, n. 1, p. 38
- Article
24
- Computer Journal, 2012, v. 55, n. 4, p. 475, doi. 10.1093/comjnl/bxr098
- Tseng, Yuh-Min;
- Tsai, Tung-Tso
- Article
25
- Computer Journal, 2012, v. 55, n. 4, p. 439, doi. 10.1093/comjnl/bxr086
- Article