Results 291 to 300 of about 299,742 (318)
Some of the next articles are maybe not open access.
Symmetric encryption and XML encryption patterns
Proceedings of the 16th Conference on Pattern Languages of Programs, 2009Most of the time information handled by organizations has been collected and processed by computers and transmitted across networks to other computers. How can we protect this information from unauthorized access when it is being transmitted? Encryption provides confidentiality by protecting sensitive information from being read by intruders.
Keiko Hashizume, Eduardo B. Fernandez
openaire +2 more sources
2021 2nd International Conference on Computing and Data Science (CDS), 2021
In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved.
openaire +2 more sources
In the current scenario, various forms of information are spread everywhere, especially through the Internet. A lot of valuable information is contained in the dissemination, so security issues have always attracted attention. With the emergence of cryptographic algorithms, information security has been further improved.
openaire +2 more sources
Network Security, 2008
Encryption has been trumpeted as the be-all and end-all of network security, and there has been a universal rush in its implementation following the widely reported series of severe data security breaches. However, those who rush into it without putting in place a comprehensive security policy are in danger of becoming complacent, leaving themselves ...
openaire +2 more sources
Encryption has been trumpeted as the be-all and end-all of network security, and there has been a universal rush in its implementation following the widely reported series of severe data security breaches. However, those who rush into it without putting in place a comprehensive security policy are in danger of becoming complacent, leaving themselves ...
openaire +2 more sources
2009
Publisher Summary Depending on the type of satellite communications link that needs to be established, substantially different technologies, frequencies, and data encryption techniques might be required. The reasons for this lie as much in the realm of human behavior as they do in the realm of physics. It is not unreasonable to conclude that satellite
openaire +4 more sources
Publisher Summary Depending on the type of satellite communications link that needs to be established, substantially different technologies, frequencies, and data encryption techniques might be required. The reasons for this lie as much in the realm of human behavior as they do in the realm of physics. It is not unreasonable to conclude that satellite
openaire +4 more sources
2020
You’ve implemented a system, and you’ve created the best database structure you can architect. Your system is taking off, and you have hundreds or thousands of clients and many gigabytes of customer data on your server. Things couldn’t be better, right? Then you get a notification that something has gone wrong with your database.
openaire +2 more sources
You’ve implemented a system, and you’ve created the best database structure you can architect. Your system is taking off, and you have hundreds or thousands of clients and many gigabytes of customer data on your server. Things couldn’t be better, right? Then you get a notification that something has gone wrong with your database.
openaire +2 more sources