Search Results - acm: e.: data/e.3: data encryption/e.3.0: code testing
-
1
Authors: et al.
Source: DAC: Annual ACM/IEEE Design Automation Conference; Jun2016, p440-445, 6p
Subject Terms: DATA encryption, CODE reuse, COMPUTER security, COMPUTER architecture, COMPUTER programming
-
2
Authors: et al.
Contributors: et al.
Source: EUROCRYPT 2012 ; https://inria.hal.science/hal-00864374 ; EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩ ; http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_30
Subject Terms: Fully-homomorphic encryption, cryptanalysis, approximate gcd, ACM: E.: Data/E.3: DATA ENCRYPTION/E.3.0: Code breaking, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Subject Geographic: Cambridge, United Kingdom
-
3
Authors: et al.
Source: BMC Medical Genomics; 7/26/2017, Vol. 10, p1-9, 9p
Subject Terms: NUCLEOTIDE sequencing, GENETIC engineering, DATA encryption, CLOUD computing, CLOUD storage
-
4
Authors: et al.
Source: IEEE Design & Test of Computers; Sep/Oct2004, Vol. 21 Issue 5, p406-415, 10p, 5 Color Photographs, 1 Diagram, 2 Charts, 10 Graphs
Subject Terms: MULTIMEDIA systems, DATA encryption, DATA compression, COMPUTER engineering, COMPUTER architecture
-
5
Authors: Pattanavichai, Santi
Source: International Journal of Electronics & Telecommunications; 2022, Vol. 68 Issue 3, p475-481, 7p
Subject Terms: RSA algorithm, PUBLIC key cryptography, COMPUTER security management, DATA security
-
6
Authors:
Source: ACM Computing Surveys; Jul2021, Vol. 53 Issue 4, p70-70:35, 35p
Subject Terms: MACHINE learning, PATERNITY testing, BIOINFORMATICS, STATISTICAL learning, DEEP learning, DECISION trees
-
7
Authors:
Source: Algorithmica; Nov2013, Vol. 67 Issue 3, p418-448, 31p
Subject Terms: CODING theory, DATA encryption, GROUP testing, PROBABILITY theory, COMPUTER users, DECODERS & decoding
-
8
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607289 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.47-56
Subject Terms: Identifying code, optimal code, hexagonal grid, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607289; https://hal.inria.fr/inria-00607289; https://hal.inria.fr/inria-00607289/document; https://hal.inria.fr/inria-00607289/file/45.pdf
-
9
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00608102 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.183-192
Subject Terms: gaps of a code, Berger-Loidreau cryptosystem, square code, GRS codes, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00608102; https://hal.inria.fr/inria-00608102; https://hal.inria.fr/inria-00608102/document; https://hal.inria.fr/inria-00608102/file/117.pdf
-
10
Authors:
Source: Journal of Big Data; 10/18/2021, Vol. 8 Issue 1, p1-14, 14p
Subject Terms: SQL, ENCRYPTION protocols, DATA security, DATABASES, SYSTEMS development, DATA encryption
-
11
Authors:
Source: ACM Computing Surveys; Oct2013, Vol. 46 Issue 1, p4-4:32, 32p, 3 Diagrams, 4 Charts
Subject Terms: BINARY codes, MALWARE, DEBUGGING, DATA encryption, COMPUTER storage devices
-
12
Authors:
Contributors:
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607291 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.57-62
Subject Terms: Linear codes, Projective spaces, Small weight codewords, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: inria-00607291; https://hal.inria.fr/inria-00607291; https://hal.inria.fr/inria-00607291/document; https://hal.inria.fr/inria-00607291/file/53.pdf
-
13
Authors: et al.
Contributors: et al.
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607730 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.91-100
Subject Terms: Ring-Linear Codes, MacWilliams' Equivalence Theorem, Extension Theorem, Weights, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607730; https://hal.inria.fr/inria-00607730; https://hal.inria.fr/inria-00607730/document; https://hal.inria.fr/inria-00607730/file/137.pdf
-
14
Authors: Neville-Neil, George V.
Source: Communications of the ACM; Aug2015, Vol. 58 Issue 8, p27-28, 2p, 1 Color Photograph
Subject Terms: DATA encryption, DOCUMENTATION
-
15
Authors: et al.
Source: Journal of Supercomputing; Jun2024, Vol. 80 Issue 9, p11923-11957, 35p
Subject Terms: DATA privacy, DATA encryption, DATA integrity, TIME complexity, CHAOS theory, DATA transmission systems
-
16
Authors: et al.
Source: 2016 Annual IEEE Systems Conference (SysCon); 2016, p1-6, 6p
-
17
Authors:
Source: Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi; Aug2024, Vol. 28 Issue 4, p756-773, 18p
-
18
Authors: et al.
Source: Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control; Vol. 8, No. 4, November 2023 ; 2503-2267 ; 2503-2259 ; 10.22219/kinetik.v8i4`
Subject Terms: Cryptography, Encryption, Decryption, QR code, Vigenere Cipher, Crpytography, Security data
File Description: application/pdf
Relation: https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734/124124365; https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734
-
19
Authors: et al.
Source: Soft Computing - A Fusion of Foundations, Methodologies & Applications; Nov2024, Vol. 28 Issue 21, p12879-12896, 18p
-
20
Authors: et al.
Source: Telkomnika; Feb2020, Vol. 18 Issue 1, p538-544, 7p
Full Text Finder
Nájsť tento článok vo Web of Science