Search ResultsElectronic Resources 
by
Tsoutsos, Nektarios Georgios, author.
Format:
Excerpt:
directly in encrypted form, using the power of additive homomorphic encryption. Our objective is to support
by
Burney, Micaela L., author.
Format:
Excerpt:
or hiding data inside other data. A combination of steganography and encryption can be used for an
by
Satapathy, Suresh Chandra. editor.
Format:
Excerpt:
Preservation in Cloud Computing with Double Encryption Method -- A Machine learning based approach for Opinion
by
Dey, Nilanjan. editor.
Format:
Excerpt:
offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption
by
Thames, Lane. editor.
Format:
Excerpt:
Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized
by
Wayner, Peter, 1964-
ScienceDirect https://www.sciencedirect.com/science/book/9780123744791
Format:
Excerpt:
. These methods include encryption, compression, data embedding and watermarking, data mimicry, and
by
Chandra, Praphul.
ScienceDirect http://www.sciencedirect.com/science/book/9780750677462
Format:
Excerpt:
desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
by
Vacca, John R.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582975
Format:
Excerpt:
deploying firewalls, data encryption and decryption and other countermeasures.
by
Reid, Fiach.
ScienceDirect https://www.sciencedirect.com/science/book/9781555583156
Format:
Excerpt:
-- Protecting data : encryption -- Controlling user access : authentication and authorization -- Programming for
by
Gallo, Michael A.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582524
Format:
Excerpt:
infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES
by
Wayner, Peter, 1964-
ScienceDirect http://www.sciencedirect.com/science/book/9781558607699
Format:
Excerpt:
different techniques to hide information. These include encryption, making data incomprehensible
by
Stefanek, George L.
ScienceDirect https://www.sciencedirect.com/science/book/9781878707963
Format:
Excerpt:
And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The

Select an Action





