EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Encryption"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 43 Datensicherheit 43 Encryption 38 encryption 27 Datenschutz 25 Blockchain 24 Data protection 23 Cryptography 22 Cloud Computing 21 Kryptographie 17 Cloud computing 16 Security 15 Virtual currency 14 Virtuelle Währung 14 Privacy 13 Algorithm 10 Algorithmus 10 Theorie 10 Theory 10 Electronic Commerce 9 Kryptologie 9 Homomorphic Encryption 8 Decryption 7 IT crime 7 IT-Kriminalität 7 Computer network 6 Computernetz 6 E-commerce 6 Financial technology 6 Finanztechnologie 6 Authentication 5 Bayesian equilibrium 5 Computerized method 5 Computerunterstützung 5 Confidentiality 5 Financial sector 5 Finanzsektor 5 Mechanism design 5 Surveillance 5 communication networks 5
more ... less ...
Online availability
All
Undetermined 99 Free 39 CC license 9
Type of publication
All
Article 135 Book / Working Paper 29
Type of publication (narrower categories)
All
Article in journal 59 Aufsatz in Zeitschrift 59 Graue Literatur 7 Non-commercial literature 7 Article 6 Arbeitspapier 5 Aufsatz im Buch 5 Book section 5 Konferenzschrift 5 Working Paper 5 Thesis 4 Conference paper 2 Congress Report 2 Handbook 2 Handbuch 2 Konferenzbeitrag 2 Case study 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 technical-paper 1 viewpoint 1
more ... less ...
Language
All
English 137 Undetermined 18 German 6 Romanian 2 Lithuanian 1
Author
All
Renou, Ludovic 5 Tomala, Tristan 5 Gupta, Sangeeta 3 Abrahamson, Reed 2 Borisov, Nikita 2 Byun, Junyoung 2 Cedarbaum, Jonathan G. 2 Daly, Angela 2 Dey, Nilanjan 2 Diaz, Claudia 2 Freeman, D. Reed 2 Hardy, Keiran 2 Hatzinakos, Dimitrios 2 Kartit, Ali 2 Ko, Hyungjin 2 Lee, Jaewook 2 Mann, Monique 2 Marwan, Mbarek 2 Mohammadian, Masoud 2 Molnar, Adam 2 Ouahmane, Hassan 2 Parah, Shabir A. 2 Peng, Fei 2 Powell, Benjamin A. 2 Pradhan, Padma Lochan 2 Ramiro, André 2 Savu, Laura 2 Schloss, Leah 2 Sheikh, Javaid A. 2 Xiong, Jin 2 Zeng, Guihua 2 Zhou, Nanrun 2 Zhu, Fuchen 2 Abascal-Olascoaga, Gonzalo 1 Abbasi, Hasan 1 Abdelkader, Gafour 1 Abrishami, Saied 1 Abu-Amara, Fadi 1 Achkoun, Khadija 1 Agarwal, Shubham 1
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 CoDecFin <2., 2021, Online> 1 DeFi <1., 2021, Online> 1 Department of Economics, Leicester University 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 FinanzBuch Verlag 1 HEC Paris (École des Hautes Études Commerciales) 1 Kaunas University of Technology 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 USA-China Science and Culture Media Corporation 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 8 International Journal of Information Security and Privacy (IJISP) 6 International journal of business information systems : IJBIS 5 Internet Policy Review 5 International Journal of Cloud Applications and Computing (IJCAC) 4 Data science and management : DSM 3 Electronic commerce research 3 International journal of enterprise network management 3 International journal of networking and virtual organisations : IJNVO 3 Internet policy review : journal on internet regulation 3 Lecture notes in computer science 3 Physica A: Statistical Mechanics and its Applications 3 Romanian Economic Business Review 3 Asian Agricultural Research 2 Decision analytics journal 2 International Journal of Electronic Finance 2 International Journal of Organizational and Collective Intelligence (IJOCI) 2 International Journal of Rough Sets and Data Analysis (IJRSDA) 2 International Journal of Strategic Information Technology and Applications (IJSITA) 2 International journal of business process integration and management : IJBPIM 2 International journal of enterprise information systems : an official publication of the Information Resources Management Association 2 Journal of information & knowledge management : JIKM 2 Journal of risk management in financial institutions 2 Theoretical Economics 2 Advances in National Brand and Private Label Marketing : 10th International Conference, 2023 1 Advances in information security, privacy, and ethics (AISPE) book series 1 African journal of science, technology, innovation & development : AJSTID 1 Annals - Economy Series 1 Annals of Spiru Haret University, Economic Series 1 Business & Information Systems Engineering 1 Business horizons 1 Database Systems Journal 1 Deutschland Digital - Sicher - BSI 1 Discussion Papers in Economics 1 Diskussionspapiere des Instituts für Verkehrswissenschaft an der Universität Münster 1 Dissertationen der Johannes-Kepler-Universität Linz 1 Economic research 1 Energy economics 1 Finance research letters 1 Freiberger Arbeitspapiere 1
more ... less ...
Source
All
ECONIS (ZBW) 82 Other ZBW resources 45 RePEc 20 BASE 6 EconStor 6 USB Cologne (EcoSocSci) 5
Showing 61 - 70 of 164
Cover Image
Proposed Anti-Symmetric Preventive Control Optimizing the Risk on RTOS
Pradhan, Padma Lochan - In: International Journal of Strategic Information … 7 (2016) 1, pp. 16-31
, control and audit is a primary method of protecting system resources (Processor, Memory, UFS & Encryption Key) from the …. The cryptographic control (Encryption key) is a primary method of protecting system resources. The control is directly …
Persistent link: https://www.econbiz.de/10012047871
Saved in:
Cover Image
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
Wei, Zhang - In: International Journal of Technology and Human … 12 (2016) 2, pp. 72-82
primitive in cloud computing, homomorphic encryption (HE) can evaluate on ciphertext directly without decryption, thus avoid … ciphertexts encrypted by the same public key. Adopting the idea of proxy re-encryption, and focusing on the compatibility of … computation, the authors provide a pairing-based multi-user homomorphic encryption scheme. The scheme is a somewhat homomorphic …
Persistent link: https://www.econbiz.de/10012048446
Saved in:
Cover Image
Cost-effective privacy preserving of intermediate data using group search optimisation algorithm
Jaikrishna, G.; Rajendran, Sugumar - In: International journal of business information systems : … 35 (2020) 2, pp. 132-151
Persistent link: https://www.econbiz.de/10012312970
Saved in:
Cover Image
A new protocol based on blockchain technology for transparent operation of corporate social responsibility
Martínez-Ríos, Félix Orlando; Marmolejo Saucedo, … - In: Strategy, power and CSR : practices and challenges in …, (pp. 205-233). 2020
Persistent link: https://www.econbiz.de/10012263617
Saved in:
Cover Image
Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
Yu, Guangsheng; Zha, Xuan; Wang, Xu; Ni, Wei; Yu, Kan; … - In: IEEE transactions on engineering management : EM 67 (2020) 4, pp. 1213-1230
Persistent link: https://www.econbiz.de/10012387941
Saved in:
Cover Image
Quantum cryptography and the future of cyber security
Chaubey, Nirbhay Kumar (ed.); Prajapati, Bhavesh B. (ed.) - 2020
Persistent link: https://www.econbiz.de/10012394455
Saved in:
Cover Image
Addressing cyber risk in financial institutions and in the financial system
Grody, Allan D. - In: Journal of risk management in financial institutions 13 (2019/2020) 2, pp. 155-162
Persistent link: https://www.econbiz.de/10012250024
Saved in:
Cover Image
Privacy preserving targeted advertising and recommendations
Tulabandhula, Theja; Vaya, Shailesh; Dhar, Aritra - In: Journal of business analytics 3 (2020) 1, pp. 32-55
Persistent link: https://www.econbiz.de/10012255707
Saved in:
Cover Image
Three stage hybrid encryption of cloud data with penta-layer security for online business users
Subashanthini, S.; Pounambal, M. - In: Information systems and e-business management : ISeB 18 (2020) 3, pp. 379-404
Persistent link: https://www.econbiz.de/10012416434
Saved in:
Cover Image
SECURE, POLICY-BASED, MULTI-RECIPIENT DATA SHARING
Bobba, Rakesh B. - 2009
properties.In the first part of this dissertation, we focus on CiphertextPolicy Attribute-Based Encryption (CP-ABE) schemes that …-Policy Attribute-Set Based Encryption(CP-ASBE) which is the first CP-ABE scheme to (1) efficiently support naturallyoccurring compound … policy privacy. In the second part of this dissertation,we propose Policy Based Encryption System (PBES), which employs …
Persistent link: https://www.econbiz.de/10009450965
Saved in:
  • First
  • Prev
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...