Search ResultsElectronic Resources
Switch to list view
Switch to thumbnail view
6 Results Found Subscribe to search results
000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Langenberg, Brandon Wade, author.
      Format: 
      Excerpt: 
      interest. In the area of cryptography, some encryption schemes (such as RSA) are already deemed broken by
      by 
      Tsoutsos, Nektarios Georgios, author.
      Format: 
      Excerpt: 
      directly in encrypted form, using the power of additive homomorphic encryption. Our objective is to support
      by 
      Crowley, Patrick, 1974-
      Format: 
      Excerpt: 
      -specific processors, such as classification and encryption engines, to more general-purpose packet or communications
      by 
      Edmundson, Anne Marissa, author.
      Format: 
      Excerpt: 
      . Existing protocol encryption such as TLS is not sufficient, since a wide range of data, from DNS lookups to
      by 
      Su, Wencong.
      Format: 
      Excerpt: 
      - Emerging data encryption methods applicable to Energy Internet -- 8.1 Introduction -- 8.2 Importance of
      Go to:Search Results
      |
      Search Facets
      |
      Top of Page