EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Encryption"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 43 Datensicherheit 43 Encryption 38 encryption 27 Datenschutz 25 Blockchain 24 Data protection 23 Cryptography 22 Cloud Computing 21 Kryptographie 17 Cloud computing 16 Security 15 Virtual currency 14 Virtuelle Währung 14 Privacy 13 Algorithm 10 Algorithmus 10 Theorie 10 Theory 10 Electronic Commerce 9 Kryptologie 9 Homomorphic Encryption 8 Decryption 7 IT crime 7 IT-Kriminalität 7 Computer network 6 Computernetz 6 E-commerce 6 Financial technology 6 Finanztechnologie 6 Authentication 5 Bayesian equilibrium 5 Computerized method 5 Computerunterstützung 5 Confidentiality 5 Financial sector 5 Finanzsektor 5 Mechanism design 5 Surveillance 5 communication networks 5
more ... less ...
Online availability
All
Undetermined 99 Free 39 CC license 9
Type of publication
All
Article 135 Book / Working Paper 29
Type of publication (narrower categories)
All
Article in journal 59 Aufsatz in Zeitschrift 59 Graue Literatur 7 Non-commercial literature 7 Article 6 Arbeitspapier 5 Aufsatz im Buch 5 Book section 5 Konferenzschrift 5 Working Paper 5 Thesis 4 Conference paper 2 Congress Report 2 Handbook 2 Handbuch 2 Konferenzbeitrag 2 Case study 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 technical-paper 1 viewpoint 1
more ... less ...
Language
All
English 137 Undetermined 18 German 6 Romanian 2 Lithuanian 1
Author
All
Renou, Ludovic 5 Tomala, Tristan 5 Gupta, Sangeeta 3 Abrahamson, Reed 2 Borisov, Nikita 2 Byun, Junyoung 2 Cedarbaum, Jonathan G. 2 Daly, Angela 2 Dey, Nilanjan 2 Diaz, Claudia 2 Freeman, D. Reed 2 Hardy, Keiran 2 Hatzinakos, Dimitrios 2 Kartit, Ali 2 Ko, Hyungjin 2 Lee, Jaewook 2 Mann, Monique 2 Marwan, Mbarek 2 Mohammadian, Masoud 2 Molnar, Adam 2 Ouahmane, Hassan 2 Parah, Shabir A. 2 Peng, Fei 2 Powell, Benjamin A. 2 Pradhan, Padma Lochan 2 Ramiro, André 2 Savu, Laura 2 Schloss, Leah 2 Sheikh, Javaid A. 2 Xiong, Jin 2 Zeng, Guihua 2 Zhou, Nanrun 2 Zhu, Fuchen 2 Abascal-Olascoaga, Gonzalo 1 Abbasi, Hasan 1 Abdelkader, Gafour 1 Abrishami, Saied 1 Abu-Amara, Fadi 1 Achkoun, Khadija 1 Agarwal, Shubham 1
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 CoDecFin <2., 2021, Online> 1 DeFi <1., 2021, Online> 1 Department of Economics, Leicester University 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 FinanzBuch Verlag 1 HEC Paris (École des Hautes Études Commerciales) 1 Kaunas University of Technology 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 USA-China Science and Culture Media Corporation 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 8 International Journal of Information Security and Privacy (IJISP) 6 International journal of business information systems : IJBIS 5 Internet Policy Review 5 International Journal of Cloud Applications and Computing (IJCAC) 4 Data science and management : DSM 3 Electronic commerce research 3 International journal of enterprise network management 3 International journal of networking and virtual organisations : IJNVO 3 Internet policy review : journal on internet regulation 3 Lecture notes in computer science 3 Physica A: Statistical Mechanics and its Applications 3 Romanian Economic Business Review 3 Asian Agricultural Research 2 Decision analytics journal 2 International Journal of Electronic Finance 2 International Journal of Organizational and Collective Intelligence (IJOCI) 2 International Journal of Rough Sets and Data Analysis (IJRSDA) 2 International Journal of Strategic Information Technology and Applications (IJSITA) 2 International journal of business process integration and management : IJBPIM 2 International journal of enterprise information systems : an official publication of the Information Resources Management Association 2 Journal of information & knowledge management : JIKM 2 Journal of risk management in financial institutions 2 Theoretical Economics 2 Advances in National Brand and Private Label Marketing : 10th International Conference, 2023 1 Advances in information security, privacy, and ethics (AISPE) book series 1 African journal of science, technology, innovation & development : AJSTID 1 Annals - Economy Series 1 Annals of Spiru Haret University, Economic Series 1 Business & Information Systems Engineering 1 Business horizons 1 Database Systems Journal 1 Deutschland Digital - Sicher - BSI 1 Discussion Papers in Economics 1 Diskussionspapiere des Instituts für Verkehrswissenschaft an der Universität Münster 1 Dissertationen der Johannes-Kepler-Universität Linz 1 Economic research 1 Energy economics 1 Finance research letters 1 Freiberger Arbeitspapiere 1
more ... less ...
Source
All
ECONIS (ZBW) 82 Other ZBW resources 45 RePEc 20 BASE 6 EconStor 6 USB Cologne (EcoSocSci) 5
Showing 91 - 100 of 164
Cover Image
Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption
Ahmad, Musheer; Ahmad, Zishan - In: International Journal of Rough Sets and Data Analysis … 5 (2018) 2, pp. 131-147
Cryptographic Substitution-boxes are source of nonlinearity in modern block encryption systems. The robustness and … cryptographically potent S-boxes to develop strong encryption systems. In this paper, an effective method to design efficient 8×8 S … encrypt plain-image with proposed S-box transformation to unveil and highlight its inherent great encryption strength. The …
Persistent link: https://www.econbiz.de/10012047411
Saved in:
Cover Image
Securing Stored Biometric Template Using Cryptographic Algorithm
Lakhera, Manmohan; Rauthan, Manmohan Singh - In: International Journal of Rough Sets and Data Analysis … 5 (2018) 4, pp. 48-60
The biometric template protection technique provides the security in many authentication applications. Authentication based on biometrics has more advantages over traditional methods such as password and token-based authentication methods. The advantage of any biometric-based authentication...
Persistent link: https://www.econbiz.de/10012047420
Saved in:
Cover Image
Improving the Bluetooth Hopping Sequence for Better Security in IoT Devices
Sinda, Matt; Danner, Tyler; O'Neill, Sean; Alqurashi, Abeer - In: International Journal of Software Innovation (IJSI) 6 (2018) 4, pp. 117-131
already been placed on the market. Most of the work done in improving security has been in the area of encryption. However …, with the relatively small footprint of IoT devices, this makes strong encryption difficult. The authors' method will show …
Persistent link: https://www.econbiz.de/10012047829
Saved in:
Cover Image
PpBAC: Popularity Based Access Control Model for Cloud Computing
Namasudra, Suyel; Roy, Pinki - In: Journal of Organizational and End User Computing (JOEUC) 30 (2018) 4, pp. 14-31
This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access...
Persistent link: https://www.econbiz.de/10012049254
Saved in:
Cover Image
A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environment
Aljammal, Ashraf H.; Bani-Salameh, Hani; Qawasmeh, Ahmad; … - In: International journal of business information systems : … 28 (2018) 4, pp. 393-403
Persistent link: https://www.econbiz.de/10011924296
Saved in:
Cover Image
Research on key techniques of cryptographic access control and properties optimisation in cloud storage
Zhu, Shidong; Jiang, Liu; Zhou, Zhenliu - In: International journal of information technology and … 17 (2018) 4, pp. 257-274
Persistent link: https://www.econbiz.de/10011989744
Saved in:
Cover Image
Cyber risk from a chief risk officer perspective
Grobler, Jaco - In: Journal of risk management in financial institutions 11 (2017/2018) 2, pp. 125-131
Persistent link: https://www.econbiz.de/10011879463
Saved in:
Cover Image
A cloud based solution for collaborative and secure sharing of medical data
Marwan, Mbarek; Kartit, Ali; Ouahmane, Hassan - In: International journal of enterprise information systems … 14 (2018) 3, pp. 128-145
Persistent link: https://www.econbiz.de/10011886427
Saved in:
Cover Image
Miscegenation of scalable and DEP3K performance evaluation of nosql-cassandra for bigdata applications deployed in cloud
Gupta, Sangeeta; Narsimha, G. - In: International journal of business process integration … 9 (2018) 1, pp. 12-21
Persistent link: https://www.econbiz.de/10011914130
Saved in:
Cover Image
Privacy-preserving condition-based forecasting using machine learning
Taigel, Fabian; Tueno, Anselme K.; Pibernik, Richard - In: Journal of business economics : JBE 88 (2018) 5, pp. 563-592
Persistent link: https://www.econbiz.de/10011888565
Saved in:
  • First
  • Prev
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...