EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Encryption"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 43 Datensicherheit 43 Encryption 38 encryption 27 Datenschutz 25 Blockchain 24 Data protection 23 Cryptography 22 Cloud Computing 21 Kryptographie 17 Cloud computing 16 Security 15 Virtual currency 14 Virtuelle Währung 14 Privacy 13 Algorithm 10 Algorithmus 10 Theorie 10 Theory 10 Electronic Commerce 9 Kryptologie 9 Homomorphic Encryption 8 Decryption 7 IT crime 7 IT-Kriminalität 7 Computer network 6 Computernetz 6 E-commerce 6 Financial technology 6 Finanztechnologie 6 Authentication 5 Bayesian equilibrium 5 Computerized method 5 Computerunterstützung 5 Confidentiality 5 Financial sector 5 Finanzsektor 5 Mechanism design 5 Surveillance 5 communication networks 5
more ... less ...
Online availability
All
Undetermined 99 Free 39 CC license 9
Type of publication
All
Article 135 Book / Working Paper 29
Type of publication (narrower categories)
All
Article in journal 59 Aufsatz in Zeitschrift 59 Graue Literatur 7 Non-commercial literature 7 Article 6 Arbeitspapier 5 Aufsatz im Buch 5 Book section 5 Konferenzschrift 5 Working Paper 5 Thesis 4 Conference paper 2 Congress Report 2 Handbook 2 Handbuch 2 Konferenzbeitrag 2 Case study 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 technical-paper 1 viewpoint 1
more ... less ...
Language
All
English 137 Undetermined 18 German 6 Romanian 2 Lithuanian 1
Author
All
Renou, Ludovic 5 Tomala, Tristan 5 Gupta, Sangeeta 3 Abrahamson, Reed 2 Borisov, Nikita 2 Byun, Junyoung 2 Cedarbaum, Jonathan G. 2 Daly, Angela 2 Dey, Nilanjan 2 Diaz, Claudia 2 Freeman, D. Reed 2 Hardy, Keiran 2 Hatzinakos, Dimitrios 2 Kartit, Ali 2 Ko, Hyungjin 2 Lee, Jaewook 2 Mann, Monique 2 Marwan, Mbarek 2 Mohammadian, Masoud 2 Molnar, Adam 2 Ouahmane, Hassan 2 Parah, Shabir A. 2 Peng, Fei 2 Powell, Benjamin A. 2 Pradhan, Padma Lochan 2 Ramiro, André 2 Savu, Laura 2 Schloss, Leah 2 Sheikh, Javaid A. 2 Xiong, Jin 2 Zeng, Guihua 2 Zhou, Nanrun 2 Zhu, Fuchen 2 Abascal-Olascoaga, Gonzalo 1 Abbasi, Hasan 1 Abdelkader, Gafour 1 Abrishami, Saied 1 Abu-Amara, Fadi 1 Achkoun, Khadija 1 Agarwal, Shubham 1
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 CoDecFin <2., 2021, Online> 1 DeFi <1., 2021, Online> 1 Department of Economics, Leicester University 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 FinanzBuch Verlag 1 HEC Paris (École des Hautes Études Commerciales) 1 Kaunas University of Technology 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 USA-China Science and Culture Media Corporation 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 8 International Journal of Information Security and Privacy (IJISP) 6 International journal of business information systems : IJBIS 5 Internet Policy Review 5 International Journal of Cloud Applications and Computing (IJCAC) 4 Data science and management : DSM 3 Electronic commerce research 3 International journal of enterprise network management 3 International journal of networking and virtual organisations : IJNVO 3 Internet policy review : journal on internet regulation 3 Lecture notes in computer science 3 Physica A: Statistical Mechanics and its Applications 3 Romanian Economic Business Review 3 Asian Agricultural Research 2 Decision analytics journal 2 International Journal of Electronic Finance 2 International Journal of Organizational and Collective Intelligence (IJOCI) 2 International Journal of Rough Sets and Data Analysis (IJRSDA) 2 International Journal of Strategic Information Technology and Applications (IJSITA) 2 International journal of business process integration and management : IJBPIM 2 International journal of enterprise information systems : an official publication of the Information Resources Management Association 2 Journal of information & knowledge management : JIKM 2 Journal of risk management in financial institutions 2 Theoretical Economics 2 Advances in National Brand and Private Label Marketing : 10th International Conference, 2023 1 Advances in information security, privacy, and ethics (AISPE) book series 1 African journal of science, technology, innovation & development : AJSTID 1 Annals - Economy Series 1 Annals of Spiru Haret University, Economic Series 1 Business & Information Systems Engineering 1 Business horizons 1 Database Systems Journal 1 Deutschland Digital - Sicher - BSI 1 Discussion Papers in Economics 1 Diskussionspapiere des Instituts für Verkehrswissenschaft an der Universität Münster 1 Dissertationen der Johannes-Kepler-Universität Linz 1 Economic research 1 Energy economics 1 Finance research letters 1 Freiberger Arbeitspapiere 1
more ... less ...
Source
All
ECONIS (ZBW) 82 Other ZBW resources 45 RePEc 20 BASE 6 EconStor 6 USB Cologne (EcoSocSci) 5
Showing 141 - 150 of 164
Cover Image
The effective intrusion detection system using optimal feature selection algorithm
Poongodi, M.; Bose, S.; Ganeshkumar, N. - In: International journal of enterprise network management 6 (2015) 4, pp. 263-274
Persistent link: https://www.econbiz.de/10011539604
Saved in:
Cover Image
An efficient mechanism for protecting grid from attack using GSOC
Kalaiselvi, R.; Kavitha, V. - In: International journal of enterprise network management 6 (2015) 4, pp. 312-323
Persistent link: https://www.econbiz.de/10011539620
Saved in:
Cover Image
Scalability architecture for a secure big data system
Sá Sousa, João; Meteus, Tiago; Furtado, Pedro - In: International journal of business process integration … 7 (2014/2015) 4, pp. 345-363
Persistent link: https://www.econbiz.de/10011543917
Saved in:
Cover Image
Security in Computing: Threats and their Management, Encryption Systems
Valinčius, Tomas - 2008
organization’s point of view. Finally, there is a review of encryption systems, there types, differences and measures. …
Persistent link: https://www.econbiz.de/10009478729
Saved in:
Cover Image
A COMPARISON OF THE MOST POPULAR ELECTRONIC MICROPAYMENT SYSTEMS
Pîrjan, Alexandru; Petroşanu, Dana-Mihaela - In: Romanian Economic Business Review 3 (2008) 4, pp. 97-110
The buying and selling of products or services over electronic systems such as the Internet and other computer networks is known as electronic commerce. In order to reduce the costs of electronic transactions, when one exchanges cheaper goods and services, specific payment protocols must be...
Persistent link: https://www.econbiz.de/10005439874
Saved in:
Cover Image
Mechanism Design and Communication Networks
Renou, Ludovic; Tomala, Tristan - Department of Economics, Leicester University - 2008
encryption techniques together with appropriate incentives to secure the transmission of each player’s private information to the …
Persistent link: https://www.econbiz.de/10005561926
Saved in:
Cover Image
Secure Distributed Databases Using Cryptography
IVAN, Ion; TOMA, Cristian - In: Informatica Economica X (2006) 3, pp. 25-29
The computational encryption is used intensively by different databases management systems for ensuring privacy and …
Persistent link: https://www.econbiz.de/10009416412
Saved in:
Cover Image
Privacy trade-offs in web-based services
Boyens, Claus - 2005
of an encryption-based service architecture in an untrusted two-party environment We analyze the foundations of trust in …. For these cases, we derive a new privacy-preserving architecture that is based on an adapted homomorphic encryption …
Persistent link: https://www.econbiz.de/10009467121
Saved in:
Cover Image
Security analysis of a chaos-based image encryption algorithm
Lian, Shiguo; Sun, Jinsheng; Wang, Zhiquan - In: Physica A: Statistical Mechanics and its Applications 351 (2005) 2, pp. 645-661
The security of Fridrich's algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to...
Persistent link: https://www.econbiz.de/10010589989
Saved in:
Cover Image
A critical analysis of buyer authenticated credit card payment programs: the online merchant's perspective
Ally, Mustafa; Toleman, Mark - 2004
[Abstract]: Recently introduced by the major credit card associations as replacements for the decommissioned SET and 3DSET protocols, the new payment models, 3DSecure and UCAF/SPA, have been designed to provide online merchants with a solution to an existing problem in online credit card...
Persistent link: https://www.econbiz.de/10009479709
Saved in:
  • First
  • Prev
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...