Works matching DE "DATA encryption software"
Results: 25
Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 4, p. 739
- By:
- Publication type:
- Article
Cryptography on the front line.
- Published in:
- Nature, 2001, v. 413, n. 6858, p. 766, doi. 10.1038/35101752
- By:
- Publication type:
- Article
Encryption technology divides policy-makers.
- Published in:
- Nature, 1997, v. 388, n. 6639, p. 217, doi. 10.1038/40724
- Publication type:
- Article
Cryfa: a secure encryption tool for genomic data.
- Published in:
- Bioinformatics, 2019, v. 35, n. 1, p. 146, doi. 10.1093/bioinformatics/bty645
- By:
- Publication type:
- Article
Conceal Classified Data by using Xiao Steganography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, n. 1, p. 38
- By:
- Publication type:
- Article
PLANNING FOR INTERNET SECURITY.
- Published in:
- Information Systems Management, 1997, v. 14, n. 1, p. 41, doi. 10.1080/10580539708907029
- By:
- Publication type:
- Article
Efficient Revocable ID-Based Encryption with a Public Channel.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 475, doi. 10.1093/comjnl/bxr098
- By:
- Publication type:
- Article
Improved Anonymous Multi-receiver Identity-Based Encryption.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 439, doi. 10.1093/comjnl/bxr086
- By:
- Publication type:
- Article
E-Psychiatry.
- Published in:
- Psychiatric Times, 2010, v. 27, n. 2, p. 18
- By:
- Publication type:
- Article
Order without Law: Reputation Promotes Cooperation in a Cryptomarket for Illegal Drugs.
- Published in:
- European Sociological Review, 2017, v. 33, n. 6, p. 752, doi. 10.1093/esr/jcx072
- By:
- Publication type:
- Article
A New Involutory 4x4 MDS Matrix for the AES-Like Block Ciphers.
- Published in:
- International Review on Computers & Software, 2011, v. 6, n. 1, p. 96
- By:
- Publication type:
- Article
Substitution-Permutation Based Image Cipher Using Chaotic Henon and Baker's Maps.
- Published in:
- International Review on Computers & Software, 2011, v. 6, n. 1, p. 40
- By:
- Publication type:
- Article
Molecular solutions of the RSA public-key cryptosystem on a DNA-based computer.
- Published in:
- Journal of Supercomputing, 2012, v. 61, n. 3, p. 642, doi. 10.1007/s11227-011-0627-z
- By:
- Publication type:
- Article
Bill loosening encryption software controls gains support.
- Published in:
- Issues in Science & Technology, 1999, v. 15, n. 3, p. 23
- Publication type:
- Article
Editorial.
- Published in:
- VIDHIGYA: The Journal of Legal Awareness, 2013, v. 8, n. 1, p. 1
- By:
- Publication type:
- Article
God in the Machine: Encryption Algorithms and the Abstract Exception to Patentability.
- Published in:
- Marquette Intellectual Property Law Review, 2012, v. 16, n. 2, p. 483
- By:
- Publication type:
- Article
Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer.
- Published in:
- Wireless Networks (10220038), 2012, v. 18, n. 2, p. 113, doi. 10.1007/s11276-011-0390-3
- By:
- Publication type:
- Article
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4724815
- By:
- Publication type:
- Article
Cybersecurity for Lawyers and Law Firms.
- Published in:
- Judges' Journal, 2014, v. 53, n. 4, p. 11
- By:
- Publication type:
- Article
Safeguarding Critical Enterprise Assets with New Encryption Module.
- Published in:
- 2013
- Publication type:
- Product Review
BETAMAX, THE IPHONE, AND BEYOND: PRIVACY, SECONDARY LIABILITY, AND THE REGULATION OF THE 3-D PRINTED GUN INDUSTRY.
- Published in:
- Regent University Law Review, 2019, v. 32, n. 1, p. 111
- By:
- Publication type:
- Article
A robust content based audio watermarking using UDWT and invariant histogram.
- Published in:
- Multimedia Tools & Applications, 2012, v. 57, n. 3, p. 453, doi. 10.1007/s11042-010-0644-6
- By:
- Publication type:
- Article
A novel image cipher based on mixed transformed logistic maps.
- Published in:
- Multimedia Tools & Applications, 2012, v. 56, n. 2, p. 315, doi. 10.1007/s11042-010-0652-6
- By:
- Publication type:
- Article
Computational Indistinguishability Between Quantum States and Its Cryptographic Application.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 3, p. 528, doi. 10.1007/s00145-011-9103-4
- By:
- Publication type:
- Article
SHEDDING LIGHT ON THE "GOING DARK" PROBLEM AND THE ENCRYPTION DEBATE.
- Published in:
- University of Michigan Journal of Law Reform, 2017, v. 50, n. 2, p. 489, doi. 10.36646/mjlr.50.2.shedding
- By:
- Publication type:
- Article