Suchergebnisse - ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code testing*
-
1
Autoren: et al.
Quelle: DAC: Annual ACM/IEEE Design Automation Conference; Jun2016, p440-445, 6p
Schlagwörter: DATA encryption, CODE reuse, COMPUTER security, COMPUTER architecture, COMPUTER programming
-
2
Autoren: et al.
Weitere Verfasser: et al.
Quelle: EUROCRYPT 2012 ; https://inria.hal.science/hal-00864374 ; EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩ ; http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_30
Schlagwörter: Fully-homomorphic encryption, cryptanalysis, approximate gcd, ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code breaking, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geographisches Schlagwort: Cambridge, United Kingdom
-
3
Autoren: et al.
Quelle: BMC Medical Genomics; 7/26/2017, Vol. 10, p1-9, 9p
Schlagwörter: NUCLEOTIDE sequencing, GENETIC engineering, DATA encryption, CLOUD computing, CLOUD storage
-
4
Autoren: et al.
Quelle: IEEE Design & Test of Computers; Sep/Oct2004, Vol. 21 Issue 5, p406-415, 10p, 5 Color Photographs, 1 Diagram, 2 Charts, 10 Graphs
-
5
Autoren: Pattanavichai, Santi
Quelle: International Journal of Electronics & Telecommunications; 2022, Vol. 68 Issue 3, p475-481, 7p
Schlagwörter: RSA algorithm, PUBLIC key cryptography, COMPUTER security management, DATA security
-
6
Autoren:
Quelle: ACM Computing Surveys; Jul2021, Vol. 53 Issue 4, p70-70:35, 35p
Schlagwörter: MACHINE learning, PATERNITY testing, BIOINFORMATICS, STATISTICAL learning, DEEP learning, DECISION trees
-
7
Autoren:
Quelle: Algorithmica; Nov2013, Vol. 67 Issue 3, p418-448, 31p
Schlagwörter: CODING theory, DATA encryption, GROUP testing, PROBABILITY theory, COMPUTER users, DECODERS & decoding
-
8
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607289 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.47-56
Schlagwörter: Identifying code, optimal code, hexagonal grid, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607289; https://hal.inria.fr/inria-00607289; https://hal.inria.fr/inria-00607289/document; https://hal.inria.fr/inria-00607289/file/45.pdf
-
9
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00608102 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.183-192
Schlagwörter: gaps of a code, Berger-Loidreau cryptosystem, square code, GRS codes, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00608102; https://hal.inria.fr/inria-00608102; https://hal.inria.fr/inria-00608102/document; https://hal.inria.fr/inria-00608102/file/117.pdf
-
10
Autoren:
Quelle: Journal of Big Data; 10/18/2021, Vol. 8 Issue 1, p1-14, 14p
Schlagwörter: SQL, ENCRYPTION protocols, DATA security, DATABASES, SYSTEMS development, DATA encryption
-
11
Autoren:
Quelle: ACM Computing Surveys; Oct2013, Vol. 46 Issue 1, p4-4:32, 32p, 3 Diagrams, 4 Charts
Schlagwörter: BINARY codes, MALWARE, DEBUGGING, DATA encryption, COMPUTER storage devices
-
12
Autoren:
Weitere Verfasser:
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607291 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.57-62
Schlagwörter: Linear codes, Projective spaces, Small weight codewords, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: inria-00607291; https://hal.inria.fr/inria-00607291; https://hal.inria.fr/inria-00607291/document; https://hal.inria.fr/inria-00607291/file/53.pdf
-
13
Autoren: et al.
Weitere Verfasser: et al.
Quelle: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607730 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.91-100
Schlagwörter: Ring-Linear Codes, MacWilliams' Equivalence Theorem, Extension Theorem, Weights, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607730; https://hal.inria.fr/inria-00607730; https://hal.inria.fr/inria-00607730/document; https://hal.inria.fr/inria-00607730/file/137.pdf
-
14
Autoren: Neville-Neil, George V.
Quelle: Communications of the ACM; Aug2015, Vol. 58 Issue 8, p27-28, 2p, 1 Color Photograph
Schlagwörter: DATA encryption, DOCUMENTATION
-
15
Autoren: et al.
Quelle: Journal of Supercomputing; Jun2024, Vol. 80 Issue 9, p11923-11957, 35p
Schlagwörter: DATA privacy, DATA encryption, DATA integrity, TIME complexity, CHAOS theory, DATA transmission systems
-
16
Autoren: et al.
Quelle: 2016 Annual IEEE Systems Conference (SysCon); 2016, p1-6, 6p
-
17
Autoren:
Quelle: Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi; Aug2024, Vol. 28 Issue 4, p756-773, 18p
-
18
Autoren: et al.
Quelle: Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control; Vol. 8, No. 4, November 2023 ; 2503-2267 ; 2503-2259 ; 10.22219/kinetik.v8i4`
Schlagwörter: Cryptography, Encryption, Decryption, QR code, Vigenere Cipher, Crpytography, Security data
Dateibeschreibung: application/pdf
Relation: https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734/124124365; https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734
-
19
Autoren: et al.
Quelle: Soft Computing - A Fusion of Foundations, Methodologies & Applications; Nov2024, Vol. 28 Issue 21, p12879-12896, 18p
-
20
Autoren: et al.
Quelle: Telkomnika; Feb2020, Vol. 18 Issue 1, p538-544, 7p
Full Text Finder
Nájsť tento článok vo Web of Science