Results 291 to 300 of about 295,907 (320)
A secured remote patient monitoring framework for IoMT ecosystems. [PDF]
Bhattacharya P+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Encrypted PRNG by Logic Encryption
2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020In this paper, the authors consider such an area of information security as logical encryption. Logical encryption is one of the most important methods of hardware protection, which introduces additional key inputs into a given combinational scheme to protect functionality from unauthorized use.
Marina A. Kiryakina+2 more
openaire +2 more sources
SSRN Electronic Journal, 2011
During the 1990s, encryption was one of the most hotly debated areas of technology law and policy. Law enforcement and security agencies initially supported limits on the export of strong encryption for national security reasons. In 1999, however, the administration shifted position to allow largely unrestricted export of encryption technologies ...
Kenesa Ahmad, Peter Swire
openaire +3 more sources
During the 1990s, encryption was one of the most hotly debated areas of technology law and policy. Law enforcement and security agencies initially supported limits on the export of strong encryption for national security reasons. In 1999, however, the administration shifted position to allow largely unrestricted export of encryption technologies ...
Kenesa Ahmad, Peter Swire
openaire +3 more sources
2009
The Internet evolved over the years as a means for users to access information and exchange emails. Later, once the bandwidth became available, businesses exploited the Internet’s popularity to reach customers online. In the past few years it has been reported that organizations that store and maintain customers’ private and confidential records were ...
Bhushan Kapoor, Pramod Pandya
openaire +6 more sources
The Internet evolved over the years as a means for users to access information and exchange emails. Later, once the bandwidth became available, businesses exploited the Internet’s popularity to reach customers online. In the past few years it has been reported that organizations that store and maintain customers’ private and confidential records were ...
Bhushan Kapoor, Pramod Pandya
openaire +6 more sources
2002
Publisher Summary Hiding information is a tricky business. The standard encryption functions such as AES (Advanced Encryption Standard) or RSA (the algorithm developed by Ron Rivest, Adi Shamir, and Len Adlernan at MIT) hide data by making it incomprehensible. They take information and convert it into total randomness or white noise.
openaire +4 more sources
Publisher Summary Hiding information is a tricky business. The standard encryption functions such as AES (Advanced Encryption Standard) or RSA (the algorithm developed by Ron Rivest, Adi Shamir, and Len Adlernan at MIT) hide data by making it incomprehensible. They take information and convert it into total randomness or white noise.
openaire +4 more sources
Proceedings of the ACM SIGCOMM 2010 conference, 2010
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today. The primary reason for this neglect is economic, mainly security protocol speed and cost.
Shay Gueron+5 more
openaire +2 more sources
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today. The primary reason for this neglect is economic, mainly security protocol speed and cost.
Shay Gueron+5 more
openaire +2 more sources