Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Livro
|
![]() |
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, ProceedingsBuccafurri, Francesco ; Holzinger, Andreas ; Kieseberg, Peter ; Tjoa, A Min ; Weippl, Edgar Buccafurri, Francesco ; Tjoa, A Min ; Kieseberg, Peter ; Holzinger, Andreas ; Buccafurri, Francesco ; Weippl, Edgar ; Holzinger, Andreas ; Tjoa, A Min ; Kieseberg, PeterNetherlands: Springer Nature 2016Texto completo disponível |
2 |
Material Type: Livro
|
![]() |
Financial cryptography Third International Conference, FC '99, Anguilla, British West Indies, February 1999 ; proceedingsFC'99 (1999 Anguilla) Matthew FranklinNew York Springer-Verlag London c1999Localização: ICMC - Inst. Ciên. Mat. Computação (68-02 LNCS v.1648 e.1 )(Acessar) |
3 |
Material Type: Livro
|
![]() |
Financial cryptography 4th International Conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000 : proceedingsFC 2000 (2000 Anguilla) Yair FrankelBerlin Springer London c2001Localização: ICMC - Inst. Ciên. Mat. Computação (68-02 LNCS v.1962 ) e outros locais(Acessar) |
4 |
Material Type: Livro
|
![]() |
Financial cryptography 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001 : proceedingsFC 2001 (2001 Grand Cayman Island, Cayman Islands) Paul F SyversonBerlin ; New York Springer c2002Localização: ICMC - Inst. Ciên. Mat. Computação (68-02 LNCS v.2339 ) e outros locais(Acessar) |
5 |
Material Type: Artigo
|
![]() |
Compensation Method of Electronic Commerce Data Transmission Delay Based on Fuzzy Encryption AlgorithmXiao, YinyinMobile networks and applications, 2022-08, Vol.27 (4), p.1339-1348 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Application of Data Encryption Technology in Computer Network Information SecurityLi, Lifeng Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-08, Vol.2022, p.1-8 [Periódico revisado por pares]London: HindawiTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5GGupta, Rajeev Kumar ; Almuzaini, Khalid K. ; Pateriya, R. K. ; Shah, Kaushal ; Shukla, Piyush Kumar ; Akwafo, Reynah Hashmi, Mohammad Farukh ; Mohammad Farukh HashmiWireless communications and mobile computing, 2022-03, Vol.2022, p.1-14 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Application of Information Encryption Technology in Computer Network Communication SecurityZhang, Hongbo Nagaraj, Balakrishnan ; Balakrishnan NagarajWireless communications and mobile computing, 2022-08, Vol.2022, p.1-7 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationLi, Jiguo ; Hu, Shengzhou ; Zhang, Yichen ; Han, JinguangSoft computing (Berlin, Germany), 2020-02, Vol.24 (3), p.1869-1882 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
An efficient image encryption scheme based on double affine substitution box and chaotic systemKhan, Majid ; Jamal, Sajjad Shaukat ; Hazzazi, Mohammad Mazyad ; Ali, Khawaja Muhammad ; Hussain, Iqtadar ; Asif, MuhammadIntegration (Amsterdam), 2021-11, Vol.81, p.108-122 [Periódico revisado por pares]Amsterdam: Elsevier B.VTexto completo disponível |