EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Advanced Encryption Standard"
Narrow search

Narrow search

Year of publication
Subject
All
Advanced Encryption Standard 2 Data security 2 Datensicherheit 2 AES 1 Advanced Encryption Standard Processor Memory Encryption 1 Advanced encryption standard 1 Algorithm 1 Algorithmus 1 Buffered Routing 1 Central Processing Unit 1 Cloud Computing 1 Cloud computing 1 Cryptographic Key Management 1 Cyber security 1 Discrete Cosine Transform 1 Discrete Wavelet Transform 1 Elliptic curve cryptography 1 Fault Tolerance 1 Google apps 1 Huffman 1 IT crime 1 IT-Kriminalität 1 Industry 4.0 1 Java 1 Limpel Ziv Walsh 1 Mathematical programming 1 Mathematische Optimierung 1 Mobile Anwendung 1 Mobile application 1 Network Simulator 2 1 Preventive Detective Corrective Control 1 Risk Mitigation 1 Run Length Encoding 1 Secure Routing Protocol 1 Secure Socket Layer 1 Standardisierung 1 Standardization 1 Theorie 1 Theory 1 Wireless Sensor Net 1
more ... less ...
Online availability
All
Undetermined 4
Type of publication
All
Article 5
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2
Language
All
English 5
Author
All
Akojwar, Sudhir Gangadharrao 1 Bose, S. 1 Ganeshkumar, N. 1 Khan, Zafar Jawed 1 Krishnamoorthy, N. 1 Poongodi, M. 1 Pradhan, Padma Lochan 1 Rathee, Geetanjali 1 Saini, Hemraj 1 Sawlikar, Alka Prasad 1 Umarani, S. 1
more ... less ...
Published in...
All
International Journal of Business Data Communications and Networking (IJBDCN) 1 International Journal of Strategic Information Technology and Applications (IJSITA) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of enterprise network management 1 The journal of high technology management research 1
Source
All
Other ZBW resources 3 ECONIS (ZBW) 2
Showing 1 - 5 of 5
Cover Image
Implementation and management of cloud security for industry 4.0-data using hybrid elliptical curve cryptography
Krishnamoorthy, N.; Umarani, S. - In: The journal of high technology management research 34 (2023) 2, pp. 1-12
Persistent link: https://www.econbiz.de/10014486583
Saved in:
Cover Image
Secure Buffer-Based Routing Protocol for WMN
Rathee, Geetanjali; Saini, Hemraj - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 28-44
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a...
Persistent link: https://www.econbiz.de/10012043268
Saved in:
Cover Image
Efficient Energy Saving Cryptographic Techniques with Software Solution in Wireless Network
Sawlikar, Alka Prasad; Khan, Zafar Jawed; Akojwar, … - In: International Journal of Synthetic Emotions (IJSE) 7 (2016) 2, pp. 78-96
To reduce communication costs, to protect our data from eavesdropping and from unauthorized users, cryptographic algorithms are used. Cryptographic module has to be developed for combining the operation of compression and encryption synchronously on the file. The information file is preliminary...
Persistent link: https://www.econbiz.de/10012047564
Saved in:
Cover Image
Proposed Anti-Symmetric Preventive Control Optimizing the Risk on RTOS
Pradhan, Padma Lochan - In: International Journal of Strategic Information … 7 (2016) 1, pp. 16-31
Now a day increasing the clients, business and computer & communications by complex IT infrastructure has growing the risk to proprietary information is a common in around the globe and as well as cloud. The operating system risk assessment, control and audit is a primary method of protecting...
Persistent link: https://www.econbiz.de/10012047871
Saved in:
Cover Image
The effective intrusion detection system using optimal feature selection algorithm
Poongodi, M.; Bose, S.; Ganeshkumar, N. - In: International journal of enterprise network management 6 (2015) 4, pp. 263-274
Persistent link: https://www.econbiz.de/10011539604
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...