Search Results - Schipper Text Policy-Attribute Based Encryption Algorithm
-
1
Authors: et al.
Source: Computer Journal; Apr2020, Vol. 63 Issue 4, p508-524, 17p
Subject Terms: LEAKAGE, CLOUD storage, ACCESS control, BASE pairs
-
2
Authors: Ed Dawson
Resource Type: eBook.
Subjects: Cryptography, Data encryption (Computer science), Data protection, Operating systems (Computers), Electronic commerce, Computer networks, Coding theory, Information theory
Categories: COMPUTERS / Security / Cryptography & Encryption, BUSINESS & ECONOMICS / E-Commerce / General, COMPUTERS / Information Theory, COMPUTERS / Networking / General, COMPUTERS / Operating Systems / General, COMPUTERS / Security / General, COMPUTERS / Electronic Commerce
-
3
Authors: et al.
Resource Type: eBook.
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Security / Network Security, COMPUTERS / Security / General
-
4
Authors:
Resource Type: eBook.
Subjects: Cryptography, Data encryption (Computer science), Data structures (Computer science), Information theory, Computer networks, Data protection, Application software, Software engineering
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Database Administration & Management, COMPUTERS / Information Theory, COMPUTERS / Networking / General, COMPUTERS / Software Development & Engineering / General, COMPUTERS / Security / General
-
5
Authors:
Resource Type: eBook.
Subjects: Cryptography, Data encryption (Computer science), Data protection, Coding theory, Information theory, Electronic data processing—Management, Computer science, Computer science—Mathematics
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Computer Science, COMPUTERS / Information Theory, COMPUTERS / Management Information Systems, COMPUTERS / Security / General, MATHEMATICS / Applied
-
6
Authors: et al.
Resource Type: eBook.
Categories: COMPUTERS / Computer Science, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Artificial Intelligence / Computer Vision & Pattern Recognition, COMPUTERS / Networking / General, COMPUTERS / Hardware / General, MATHEMATICS / Probability & Statistics / General
-
7
Authors: et al.
Resource Type: eBook.
Subjects: Application software, Computer networks, Algorithms, Electronic data processing—Management, Cryptography, Data encryption (Computer science), Computers and civilization
Categories: COMPUTERS / Business & Productivity Software / General, COMPUTERS / Management Information Systems, COMPUTERS / Networking / General, COMPUTERS / Programming / Algorithms, COMPUTERS / Social Aspects, COMPUTERS / Security / Cryptography & Encryption
-
8
Authors: et al.
Resource Type: eBook.
Subjects: Data protection, Computer networks, Computer engineering, Cryptography, Data encryption (Computer science), Artificial intelligence
Categories: COMPUTERS / Security / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Networking / General, COMPUTERS / Hardware / General, COMPUTERS / Security / Cryptography & Encryption
-
9
Authors:
Resource Type: eBook.
Subjects: Blockchains (Databases), Internet of things
Categories: COMPUTERS / Artificial Intelligence / General, COMPUTERS / Networking / General, TECHNOLOGY & ENGINEERING / Engineering (General), COMPUTERS / Blockchain
-
10
-
11
Authors: et al.
Resource Type: eBook.
Subjects: Application software--Development, Blockchains (Databases), Electronic funds transfers, Financial institutions--Technological innovations, Banks and banking--Technological innovations
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Data Science / Data Analytics, COMPUTERS / Security / General
-
12
Authors:
Resource Type: eBook.
Categories: COMPUTERS / Internet of Things (IoT), COMPUTERS / Artificial Intelligence / General, COMPUTERS / Software Development & Engineering / Systems Analysis & Design, COMPUTERS / Internet / General
-
13
Authors: et al.
Resource Type: eBook.
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Data Science / Data Analytics, COMPUTERS / Data Science / Data Modeling & Design
-
14
Authors:
Resource Type: eBook.
Subjects: Cryptography, Data encryption (Computer science)
Categories: COMPUTERS / Security / Cryptography & Encryption
-
15
Authors:
Resource Type: eBook.
Subjects: Data encryption (Computer science)--Congresses, Computer security--Congresses, Data protection--Congresses, Computer networks--Security measures--Congresses
Categories: COMPUTERS / Security / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Hardware / General, COMPUTERS / Security / Cryptography & Encryption
-
16
Authors: et al.
Resource Type: eBook.
Subjects: Computational intelligence, Computer science—Mathematics, Discrete mathematics, Algorithms, Mathematics
Categories: COMPUTERS / Artificial Intelligence / General, COMPUTERS / Computer Science, COMPUTERS / Programming / Algorithms, MATHEMATICS / Applied, MATHEMATICS / Discrete Mathematics, TECHNOLOGY & ENGINEERING / Engineering (General)
-
17
Authors:
Resource Type: eBook.
Subjects: Cryptography, Data encryption (Computer science), Computer networks, Coding theory, Information theory, Computers, Computer science—Mathematics
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / General, COMPUTERS / Computer Science, COMPUTERS / Information Theory, COMPUTERS / Networking / General, MATHEMATICS / Applied
-
18
Authors: et al.
Resource Type: eBook.
Categories: COMPUTERS / Programming / Algorithms, COMPUTERS / Database Administration & Management, COMPUTERS / Networking / General, COMPUTERS / Software Development & Engineering / General
-
19
Authors:
Resource Type: eBook.
Subjects: Data protection--Congresses, Computer security--Congresses, Data encryption (Computer science)--Congresses
Categories: COMPUTERS / Security / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Hardware / General
-
20
Authors: et al.
Resource Type: eBook.
Categories: COMPUTERS / Business & Productivity Software / General, COMPUTERS / Security / Network Security, COMPUTERS / Security / General, COMPUTERS / Security / Cryptography & Encryption, SOCIAL SCIENCE / Criminology
Nájsť tento článok vo Web of Science