Search Results - "asymmetric encryption/decryption algorithm"
-
1
Authors: et al.
Source: Journal of Circuits, Systems & Computers; 2022, Vol. 31 Issue 1, p1-24, 24p
-
2
Authors: et al.
Source: Advances in Ubiquitous Networking; 2016, p141-154, 14p
-
3
Authors: et al.
Source: 2014 Ninth Asia Joint Conference on Information Security; 2014, p119-126, 8p
-
4
Authors: et al.
Source: 2012 CSI Sixth International Conference on Software Engineering (CONSEG); 1/ 1/2012, p1-8, 8p
-
5
Authors:
Source: IEEE International Conference on e-Technology, e-Commerce & e-Service, 2004. EEE '04. 2004; 2004, p533-536, 4p
-
6
Authors:
Source: Automated Software Engineering; Sep2015, Vol. 22 Issue 3, p291-332, 42p
Subject Terms: ENERGY consumption, SOFTWARE engineering, CENTRAL processing units, JAVA programming language
Company/Entity: INFORMATION Technologies Inc.
-
7
Authors:
Source: Journal of Computational Methods in Sciences & Engineering; 2006 Supplement 1, Vol. 6 Issue 5, p109-119, 11p, 5 Charts
-
8
-
9
Authors:
Resource Type: eBook.
Subjects: Computational intelligence, Computer engineering, Computer networks, Quantitative research
Categories: COMPUTERS / Artificial Intelligence / General, COMPUTERS / Database Administration & Management, COMPUTERS / Hardware / General, MATHEMATICS / Probability & Statistics / General, TECHNOLOGY & ENGINEERING / Engineering (General)
-
10
Authors:
Resource Type: eBook.
Subjects: Computer networks--Security measures, Medical informatics--Security measures, Computer security
Categories: COMPUTERS / Data Science / General
-
11
Authors:
Resource Type: eBook.
Categories: COMPUTERS / Security / General, COMPUTERS / Cybernetics, COMPUTERS / Security / Cryptography & Encryption
-
12
Authors:
Resource Type: eBook.
Categories: COMPUTERS / Artificial Intelligence / General, TECHNOLOGY & ENGINEERING / Engineering (General)
-
13
-
14
Authors:
Resource Type: eBook.
Subjects: Telecommunication, Ubiquitous computing--Congresses, Computer networks--Congresses, Wireless communication systems--Congresses
-
15
Authors: et al.
Resource Type: eBook.
Subjects: Data protection, Computer networks, Electronic commerce
Categories: COMPUTERS / Security / General, BUSINESS & ECONOMICS / E-Commerce / General, COMPUTERS / Networking / General, COMPUTERS / Electronic Commerce
-
16
-
17
Authors: Atul Prakash
Resource Type: eBook.
Subjects: Kalkutta (2009), Kongress, Computer security--Congresses, Information networks--Access control--Congress, Computers--Access control--Congresses, Authentifikation, Computersicherheit, Datenbanksystem, Datensicherung, Elektronisches Wasserzeichen
Categories: COMPUTERS / Networking / General, COMPUTERS / Artificial Intelligence / Computer Vision & Pattern Recognition, COMPUTERS / System Administration / Storage & Retrieval, COMPUTERS / Management Information Systems, COMPUTERS / Security / General, COMPUTERS / Security / Cryptography & Encryption
-
18
-
19
-
20
Nájsť tento článok vo Web of Science
Full Text Finder