Search Results - Python code encryption
-
1
Authors:
Source: IAENG International Journal of Applied Mathematics. May2025, Vol. 55 Issue 5, p1316-1324. 9p.
Subject Terms: *COMPUTER networks, *CRYPTOSYSTEMS, *INDIVIDUAL needs, *PYTHON programming language, *MATHEMATICS
-
2
Authors: Izosimov, Pavel
Subject Terms: Alpha Beta Network, code protection, cloud platform, secure code sharing, code security, python obfuscator, secure file transfer, code obfuscation, intellectual property protection, software licensing, secure distribution, python development, python code encryption, license management, python security, source code protection
-
3
-
4
Authors:
Source: TWMS Journal of Applied & Engineering Mathematics; 2025, Vol. 15 Issue 1, p197-206, 10p
-
5
Authors:
Source: Punjab University Journal of Mathematics; 2024, Vol. 56 Issue 11, p770-780, 11p
Subject Terms: INFORMATION technology security, DATA security, INVERSE functions, STATISTICS, DESIGN techniques
-
6
Authors:
Source: Journal of Cybersecurity & Privacy; Feb2026, Vol. 6 Issue 1, p4, 23p
-
7
Authors: Baltas, Christos
-
8
Authors: JALALI, SEYED RASOUL
-
9
Authors: JALALI, SEYED RASOUL
-
10
Authors: JALALI, SEYED RASOUL
-
11
Authors: et al.
Source: J, Vol 4, Iss 4, Pp 764-783 (2021)
Volume 4
Issue 4
Pages 52-783Subject Terms: near field communication (NFC), decryption, Science, symmetrical encryption, wireless power transfer, security, 02 engineering and technology, data transmission, true random number generator (TRNG), 0202 electrical engineering, electronic engineering, information engineering, python code, memristor, encryption
File Description: application/pdf
-
12
Authors: JALALI, SEYED RASOUL
-
13
Authors:
Source: Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi. Aug2024, Vol. 28 Issue 4, p756-773. 18p.
-
14
Authors: et al.
Source: Scientific Reports; 5/16/2025, Vol. 15 Issue 1, p1-27, 27p
-
15
-
16
Authors: et al.
Source: Journal of Intelligent & Fuzzy Systems; 2021, Vol. 41 Issue 2, p3615-3628, 14p
-
17
Authors:
Source: Digital Threats: Research & Practice; Jun2023, Vol. 4 Issue 2, p1-27, 27p
Subject Terms: REVERSE engineering, DATA mining, COMPUTER software, CONFIDENTIAL communications
-
18
Authors: Rawlinson, Nik
Source: APC (Future Publishing Ltd.); Mar2026, Issue 556, p60-77, 17p, 31 Color Photographs, 3 Charts
Subject Terms: CHATGPT, ARTIFICIAL intelligence, BUSINESS writing, CODE generators
-
19
Authors: David Mertz
Resource Type: eBook.
Subjects: Python (Computer program language)
Categories: COMPUTERS / Languages / Python
-
20
Authors:
Source: Applied Sciences (2076-3417); May2025, Vol. 15 Issue 9, p4814, 15p
Full Text Finder
Nájsť tento článok vo Web of Science