Data encryption essentials

被引:0
|
作者
Anon
机构
来源
Software World | 2005年 / 36卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:15 / 16
相关论文
共 50 条
  • [21] Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard
    Kanshi, Avaneesh
    Soundrapandiyan, Rajkumar
    Sofia, V. S. Anita
    Rajasekar, V. R.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2023, 23 (04) : 63 - 78
  • [22] Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
    Khan, Saif Ali
    Aggarwal, R. K.
    Kulkarni, Shashidhar
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 395 - 400
  • [23] Homomorphic Encryption versus Searchable Encryption for Data Retrieval on Cloud
    Bulbul, Busranur
    Bahtiyar, Serif
    Altilar, Deniz Turgay
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 187 - 192
  • [24] Data protection through Data Encryption.
    Erickson, Charles R.
    Elektronik Munchen, 1979, 28 (19): : 45 - 51
  • [25] Secure Cloud Data Encryption
    Shiraishi, Momoko
    2023 2ND ASIA-PACIFIC COMPUTER TECHNOLOGIES CONFERENCE, APCT, 2023, : 34 - 37
  • [26] Simultaneous data compression and encryption
    Wang, CE
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 558 - 563
  • [27] Encryption is not a panacea for data security
    Koehler, Jochen
    NTZ Informations und Kommunikationstechnik, 2011, 64 (05): : 44 - 45
  • [28] Biomolecular optical data storage and data encryption
    Fischer, T
    Neebe, M
    Juchem, T
    Hampp, NA
    IEEE TRANSACTIONS ON NANOBIOSCIENCE, 2003, 2 (01) : 1 - 5
  • [29] ATM encryption paces data
    不详
    R&D MAGAZINE, 1996, 38 (10): : 57 - 57
  • [30] A Technique for Data Encryption and Decryption
    Srinivasarao, P.
    Lakshmipriya, P. V.
    Azad, P. C. S.
    Alekhya, T.
    Raghavendrarao, K.
    Kishore, K.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (02): : 117 - 125