EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Encryption"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 43 Datensicherheit 43 Encryption 38 encryption 27 Datenschutz 25 Blockchain 24 Data protection 23 Cryptography 22 Cloud Computing 21 Kryptographie 17 Cloud computing 16 Security 15 Virtual currency 14 Virtuelle Währung 14 Privacy 13 Algorithm 10 Algorithmus 10 Theorie 10 Theory 10 Electronic Commerce 9 Kryptologie 9 Homomorphic Encryption 8 Decryption 7 IT crime 7 IT-Kriminalität 7 Computer network 6 Computernetz 6 E-commerce 6 Financial technology 6 Finanztechnologie 6 Authentication 5 Bayesian equilibrium 5 Computerized method 5 Computerunterstützung 5 Confidentiality 5 Financial sector 5 Finanzsektor 5 Mechanism design 5 Surveillance 5 communication networks 5
more ... less ...
Online availability
All
Undetermined 99 Free 39 CC license 9
Type of publication
All
Article 135 Book / Working Paper 29
Type of publication (narrower categories)
All
Article in journal 59 Aufsatz in Zeitschrift 59 Graue Literatur 7 Non-commercial literature 7 Article 6 Arbeitspapier 5 Aufsatz im Buch 5 Book section 5 Konferenzschrift 5 Working Paper 5 Thesis 4 Conference paper 2 Congress Report 2 Handbook 2 Handbuch 2 Konferenzbeitrag 2 Case study 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 technical-paper 1 viewpoint 1
more ... less ...
Language
All
English 137 Undetermined 18 German 6 Romanian 2 Lithuanian 1
Author
All
Renou, Ludovic 5 Tomala, Tristan 5 Gupta, Sangeeta 3 Abrahamson, Reed 2 Borisov, Nikita 2 Byun, Junyoung 2 Cedarbaum, Jonathan G. 2 Daly, Angela 2 Dey, Nilanjan 2 Diaz, Claudia 2 Freeman, D. Reed 2 Hardy, Keiran 2 Hatzinakos, Dimitrios 2 Kartit, Ali 2 Ko, Hyungjin 2 Lee, Jaewook 2 Mann, Monique 2 Marwan, Mbarek 2 Mohammadian, Masoud 2 Molnar, Adam 2 Ouahmane, Hassan 2 Parah, Shabir A. 2 Peng, Fei 2 Powell, Benjamin A. 2 Pradhan, Padma Lochan 2 Ramiro, André 2 Savu, Laura 2 Schloss, Leah 2 Sheikh, Javaid A. 2 Xiong, Jin 2 Zeng, Guihua 2 Zhou, Nanrun 2 Zhu, Fuchen 2 Abascal-Olascoaga, Gonzalo 1 Abbasi, Hasan 1 Abdelkader, Gafour 1 Abrishami, Saied 1 Abu-Amara, Fadi 1 Achkoun, Khadija 1 Agarwal, Shubham 1
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 CoDecFin <2., 2021, Online> 1 DeFi <1., 2021, Online> 1 Department of Economics, Leicester University 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 FinanzBuch Verlag 1 HEC Paris (École des Hautes Études Commerciales) 1 Kaunas University of Technology 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 USA-China Science and Culture Media Corporation 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 8 International Journal of Information Security and Privacy (IJISP) 6 International journal of business information systems : IJBIS 5 Internet Policy Review 5 International Journal of Cloud Applications and Computing (IJCAC) 4 Data science and management : DSM 3 Electronic commerce research 3 International journal of enterprise network management 3 International journal of networking and virtual organisations : IJNVO 3 Internet policy review : journal on internet regulation 3 Lecture notes in computer science 3 Physica A: Statistical Mechanics and its Applications 3 Romanian Economic Business Review 3 Asian Agricultural Research 2 Decision analytics journal 2 International Journal of Electronic Finance 2 International Journal of Organizational and Collective Intelligence (IJOCI) 2 International Journal of Rough Sets and Data Analysis (IJRSDA) 2 International Journal of Strategic Information Technology and Applications (IJSITA) 2 International journal of business process integration and management : IJBPIM 2 International journal of enterprise information systems : an official publication of the Information Resources Management Association 2 Journal of information & knowledge management : JIKM 2 Journal of risk management in financial institutions 2 Theoretical Economics 2 Advances in National Brand and Private Label Marketing : 10th International Conference, 2023 1 Advances in information security, privacy, and ethics (AISPE) book series 1 African journal of science, technology, innovation & development : AJSTID 1 Annals - Economy Series 1 Annals of Spiru Haret University, Economic Series 1 Business & Information Systems Engineering 1 Business horizons 1 Database Systems Journal 1 Deutschland Digital - Sicher - BSI 1 Discussion Papers in Economics 1 Diskussionspapiere des Instituts für Verkehrswissenschaft an der Universität Münster 1 Dissertationen der Johannes-Kepler-Universität Linz 1 Economic research 1 Energy economics 1 Finance research letters 1 Freiberger Arbeitspapiere 1
more ... less ...
Source
All
ECONIS (ZBW) 82 Other ZBW resources 45 RePEc 20 BASE 6 EconStor 6 USB Cologne (EcoSocSci) 5
Showing 81 - 90 of 164
Cover Image
An Improved Encryption Scheme for Traitor Tracing from Lattice
Ye, Qing; Hu, Mingxing; Chen, Guangxuan; Qin, Panke - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 4, pp. 21-35
This article first describes a paper by Ling, Phan, and Stehle at the CRYPTO 2014 which presented the first encryption … scheme for traitor tracing from lattice, and the scheme is almost as efficient as the learning with errors (LWE) encryption … for the user's key. Then, this article combines that with multi-bit encryption system to construct an efficient one …
Persistent link: https://www.econbiz.de/10012043981
Saved in:
Cover Image
A Cloud Based Solution for Collaborative and Secure Sharing of Medical Data
Marwan, Mbarek; Kartit, Ali; Ouahmane, Hassan - In: International Journal of Enterprise Information Systems … 14 (2018) 3, pp. 128-145
efficient homomorphic encryption that supports addition operations on ciphertexts. Based on the simulation results, the proposed …
Persistent link: https://www.econbiz.de/10012044528
Saved in:
Cover Image
Breaching Security of Full Round Tiny Encryption Algorithm
Sobti, Rajeev; Kaushal, Puneet Kumar - In: International Journal of Information Security and … 12 (2018) 1, pp. 89-98
Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its … of 0.93. We also presented how cipher text originated from tiny encryption algorithm can be distinguished from a random …
Persistent link: https://www.econbiz.de/10012045711
Saved in:
Cover Image
An Improvised Framework for Privacy Preservation in IoT
Hussain, Muzzammil; Kaliya, Neha - In: International Journal of Information Security and … 12 (2018) 2, pp. 46-63
evaluated, and a comparison is done with an existing mechanism ABE (Attribute Based Encryption). It has been found that the … proposed work takes less time and is more secure due to short key length and randomness of the parameters used in encryption …
Persistent link: https://www.econbiz.de/10012045715
Saved in:
Cover Image
A Literature Review on Image Encryption Techniques
Geetha, S; Punithavathi, P; Infanteena, A Magnus; … - In: International Journal of Information Security and … 12 (2018) 3, pp. 42-83
Encryption is one of the techniques that ensure the security of images used in various domains like military … article reviews and summarizes various image encryption techniques so as to promote development of advanced image encryption …
Persistent link: https://www.econbiz.de/10012045719
Saved in:
Cover Image
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)
Hanin, Charifa; Omary, Fouzia; Elbernoussi, Souad; … - In: International Journal of Information Security and … 12 (2018) 4, pp. 54-67
, encryption is one of the principal information security solutions that helps keep information confidentiality. This latter can be … satisfied by the use of various encryption techniques, namely block cipher. In this paper, the authors propose a novel block …
Persistent link: https://www.econbiz.de/10012045727
Saved in:
Cover Image
Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers
Khabou, Imen; Rouached, Mohsen; Viejo, Alexandre; … - In: International Journal of Information Technology and Web … 13 (2018) 4, pp. 78-103
composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to …
Persistent link: https://www.econbiz.de/10012046132
Saved in:
Cover Image
Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion
Di, Fuqiang; Zhang, Minqing; Zhang, Yingnan; Liu, Jia - In: International Journal of Mobile Computing and … 9 (2018) 4, pp. 76-96
exploit the pixel correlation and employ the Paillier public key encryption method. The algorithm is reversible. In the …
Persistent link: https://www.econbiz.de/10012046499
Saved in:
Cover Image
Privacy Preserving Classification of Biomedical Data With Secure Removing of Duplicate Records
Tarik, Boudheb; Zakaria, Elberrichi - In: International Journal of Organizational and Collective … 8 (2018) 3, pp. 41-58
Classifying data is to automatically assign predefined classes to data. It is one of the main applications of data mining. Having complete access to all data is critical for building accurate models. Data can be highly sensitive, such as biomedical data, which cannot be disclosed or shared with...
Persistent link: https://www.econbiz.de/10012046788
Saved in:
Cover Image
Better Security and Encryption Within Cloud Computing Systems
Williams, K.Y.B.; Griffin, Jimmy A.G. - In: International Journal of Public Administration in the … 5 (2018) 2, pp. 1-11
Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and …
Persistent link: https://www.econbiz.de/10012047053
Saved in:
  • First
  • Prev
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...