Suchergebnisse - "Encryption algorithms"
-
1
Autoren:
Quelle: International Journal of Advances in Scientific Research and Engineering (IJASRE), ISSN:2454-8006, DOI: 10.31695/IJASRE; Vol. 11 No. 6: IJASRE June 2025; 48-52
Schlagwörter: Data Security, Cryptography, Encryption, Data security, Encryption Algorithms
Dateibeschreibung: application/pdf
-
2
Autoren:
Quelle: Al-Iraqia Journal for Scientific Engineering Research, Vol 4, Iss 1 (2025)
-
3
Autoren: et al.
Quelle: ACM Transactions on Embedded Computing Systems. 24:1-16
-
4
Autoren:
Quelle: Acta Electrotechnica et Informatica. 25:16-24
-
5
Autoren: null Zainab Mohammed Essa
Quelle: International Journal of Scientific Research in Science, Engineering and Technology. 12:363-368
-
6
Autoren: et al.
Quelle: 2025 International Symposium on Signals, Circuits and Systems (ISSCS). :1-4
-
7
Autoren:
Quelle: Journal of Applied Informatics and Computing, Vol 9, Iss 3, Pp 642-650 (2025)
-
8
Autoren:
Quelle: Volume: 27214-227
The Eurasia Proceedings of Science Technology Engineering and MathematicsSchlagwörter: Yazılım Mühendisliği (Diğer), Inter-process communication, Encryption algorithms, Linux systems, Named pipe, Software Engineering (Other)
Dateibeschreibung: application/pdf
-
9
Autoren:
Quelle: International Journal of Latest Technology in Engineering Management & Applied Science. 14:479-507
-
10
Autoren:
Quelle: The Journal of Korean Institute of Communications and Information Sciences. 50:978-983
-
11
Autoren:
Quelle: 2025 International Conference on Networks and Cryptology (NETCRYPT). :1522-1527
-
12
Autoren: et al.
Quelle: 2025 IEEE 11th Conference on Big Data Security on Cloud (BigDataSecurity). :58-63
-
13
Autoren: et al.
Quelle: 2025 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC). :1-5
-
14
Autoren: Yibo Liu
Quelle: Frontiers in Computing and Intelligent Systems. 12:119-124
-
15
Autoren: et al.
Quelle: 2025 International Conference on Advances in Modern Age Technologies for Health and Engineering Science (AMATHE). :1-7
-
16
Autoren:
Quelle: 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES). :1-7
-
17
Autoren:
Quelle: 2025 IEEE 4th International Conference on Computing and Machine Intelligence (ICMI). :01-08
-
18
Autoren: et al.
Quelle: Journal of Neonatal Surgery. 14:440-459
-
19
Autoren:
Quelle: Lightweight Cryptographic Algorithms for Secure IoT Devices ISBN: 9789349552302
-
20
Autoren: et al.
Quelle: International Journal of Innovative Science and Research Technology. :2313-2319
Nájsť tento článok vo Web of Science
Full Text Finder