Search ResultsElectronic Resources
by
Langenberg, Brandon Wade, author.
Format:
Excerpt:
interest. In the area of cryptography, some encryption schemes (such as RSA) are already deemed broken by
by
Tsoutsos, Nektarios Georgios, author.
Format:
Excerpt:
directly in encrypted form, using the power of additive homomorphic encryption. Our objective is to support
by
Burney, Micaela L., author.
Format:
Excerpt:
or hiding data inside other data. A combination of steganography and encryption can be used for an
by
Crowley, Patrick, 1974-
ScienceDirect http://www.sciencedirect.com/science/book/9781558608757
Format:
Excerpt:
-specific processors, such as classification and encryption engines, to more general-purpose packet or communications
by
Edmundson, Anne Marissa, author.
Format:
Excerpt:
. Existing protocol encryption such as TLS is not sufficient, since a wide range of data, from DNS lookups to
by
Su, Wencong.
Format:
Excerpt:
- Emerging data encryption methods applicable to Energy Internet -- 8.1 Introduction -- 8.2 Importance of





