Results 231 to 240 of about 120,057 (278)
Some of the next articles are maybe not open access.
Cryptography and Future Security
Discrete Applied Mathematics, 2018Information Technology (IT) has been pervasive in our lives as an exciting paradigm with a user-centric environment to provide computing and communication services. IT advantages are realized in various computer science related environments such as cloud computing, ubiquitous computing, Internet of Things, and so on.
Kim, Jongsung +2 more
openaire +2 more sources
Cryptography and Secure Communication
2017We are living in a digital age. Various online threats exist that may compromise and steal your data, your money, and even your entire identity. Any systems that are connected to the Internet are exposed to a large number of potential cyber-attacks from different outside adversaries who are targeting the systems and open communication channels, either ...
Nihad A. Hassan, Rami Hijazi
openaire +1 more source
Cyberspace Security and Cryptography
2018In this chapter, we shall briefly introduce the basic concepts and ideas of cyberspace, cyberspace security, and cryptography, particularly the relationships among them.
openaire +1 more source
Cryptography and National Security
Information Systems Security, 1992This column addresses government policy issues that affect computer security. For good or for bad, government is increasingly involved with information systems in a variety of policy arenas, and computer security is an area that is attracting particular attention.
openaire +1 more source
Implementing Security and Cryptography
2013In this chapter you will investigate a critical part to any application, regardless of the framework you choose to use to develop it: security. However, not only will you investigate how to incorporate security features into your application, you will also get a unique perspective on how Node.js handles security and cryptography within its core and ...
openaire +1 more source
"Network Security And Cryptography"
Abstract : In the rapidly evolving landscape of digital communication and information exchange, the paramount conce is the assurance of secure, private, and authentic data transmission. This paper delves into the dynamic realms of network security and cryptography, exploring their synergistic role in fortifying the digital infrastructure against an ...Joshi, Siddhi +2 more
openaire +1 more source
Secure Hardware and Cryptography
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017Numerous cryptographic protocols and mechanisms have been developed to solve computer security challenges, and these techniques vary considerably with respect to security assumptions, performance tradeoffs, and applicability to problems. Secure hardware primarily uses the mechanism of isolation to solve a broad class of computer security problems ...
openaire +1 more source
Cryptography and Secure Communication
2014Today's pervasive computing and communications networks have created an intense need for secure and reliable cryptographic systems. Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new.
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly

