EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"cryptography"
Narrow search

Narrow search

Year of publication
Subject
All
Cryptography 59 Data security 46 Datensicherheit 46 Blockchain 40 cryptography 31 Virtual currency 28 Virtuelle Währung 28 Kryptographie 19 Datenschutz 14 Data protection 12 Electronic payment 12 Elektronisches Zahlungsmittel 12 Financial technology 11 Finanztechnologie 11 Cloud Computing 10 Visual Cryptography 10 Cloud computing 9 Computerized method 8 Computerunterstützung 8 IT crime 8 IT-Kriminalität 8 blockchain 8 Artificial intelligence 7 Bitcoin 7 Künstliche Intelligenz 7 Algorithm 6 Digitalisierung 6 Digitization 6 Algorithmus 5 Authentication 5 Cybersecurity 5 E-commerce 5 Electronic Commerce 5 Information technology 5 Informationstechnik 5 Payment transactions 5 Security 5 Theorie 5 Theory 5 Vertrauen 5
more ... less ...
Online availability
All
Undetermined 86 Free 43 CC license 4
Type of publication
All
Article 108 Book / Working Paper 38 Other 5
Type of publication (narrower categories)
All
Article in journal 43 Aufsatz in Zeitschrift 43 Graue Literatur 14 Non-commercial literature 14 Working Paper 12 Arbeitspapier 11 Konferenzschrift 7 Aufsatz im Buch 5 Book section 5 Article 2 Handbook 2 Handbuch 2 Thesis 2 research-article 2 Case study 1 Congress Report 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 review 1 technical-paper 1
more ... less ...
Language
All
English 126 Undetermined 17 German 4 Spanish 3 Romanian 1
Author
All
Liu, Lintao 3 Lu, Yuliang 3 Yan, Xuehu 3 Auer, Raphael A. 2 Borisov, Nikita 2 Conesa, Carlos 2 Cristina, Dascalescu Ana 2 Diaz, Claudia 2 Dutta, Paramartha 2 Echandouri, Bouchra 2 Günther, Oliver 2 Hanl, Andreas 2 Kan, Kazutoshi 2 Lipton, Alexander 2 Liu, Feng 2 López Chamorro, Noemí 2 Mandal, J. K. 2 Milne, Alistair 2 Mukhopadhyay, Somnath 2 Muthuswamy, Padmakumar 2 Omary, Fouzia 2 Padala, Preethi 2 Radu, Boriga 2 Ramkumar, Mahalingam 2 Rao, S. Krishna 2 Saini, Hemraj 2 Sarella, Venkata Ramana 2 Sharma, Anand 2 Singh, Amit Kumar 2 Singh, Jyoti Prakash 2 Singh, Maheshwari Prasad 2 Une, Masashi 2 Wan, Song 2 Xiong, Jin 2 Zeng, Guihua 2 Zheng, Zhiyong 2 Zhou, Nanrun 2 Zhu, Fuchen 2 Abdulkader, Zaid A. 1 Abercrombie, Robert K 1
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 International Conference on Computational Intelligence in Communications and Business Analytics <6., 2024, Patna> 2 Center for Operations Research and Econometrics (CORE), École des Sciences Économiques de Louvain 1 CoDecFin <2., 2021, Online> 1 College of Health and Science 1 DeFi <1., 2021, Online> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 Digital Technologies in Teaching and Learning Strategies <Veranstaltung> <2021, Rostow am Don> 1 EconWPA 1 Fachbereich Rechts- und Wirtschaftswissenschaften, Technische Universität Darmstadt 1 FinanzBuch Verlag 1 Macquarie University 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 School of Computing and Mathematics 1 University of Western Sydney 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Information Security and Privacy (IJISP) 8 International Journal of Digital Crime and Forensics (IJDCF) 7 Physica A: Statistical Mechanics and its Applications 5 Electronic commerce research 3 Informatica Economica 3 International Journal of Rough Sets and Data Analysis (IJRSDA) 3 International journal of business information systems : IJBIS 3 Lecture notes in computer science 3 Communications in Computer and Information Science 2 Documentos ocasionales / Banco de España 2 Financial Mathematics and Fintech 2 International Journal of Business Data Communications and Networking (IJBDCN) 2 International Journal of Handheld Computing Research (IJHCR) 2 International Journal of Software Innovation (IJSI) 2 International journal of networking and virtual organisations : IJNVO 2 Journal of Enterprise Information Management 2 Journal of securities operations & custody 2 Logistics 2 Ovidius University Annals, Economic Sciences Series 2 Springer eBook Collection 2 The Emerald handbook of blockchain for business 2 Acta Carolus Robertus 1 Annales Universitatis Apulensis Series Oeconomica 1 Annals of the Institute of Statistical Mathematics 1 BIS papers 1 Business & Information Systems Engineering 1 CORE Discussion Papers 1 Climate policy 1 Data Technologies and Applications 1 Decision analytics journal 1 Defence and peace economics 1 Deutschland Digital - Sicher - BSI 1 Development and Comp Systems 1 Discussion papers / CEPR 1 Economic bulletin 1 GITAM journal of management : a quarterly publication of GITAM Institute of Management 1 Global Value Chains in Latin America : Experiences of Transformations 1 Homo oeconomicus 1 IEEE transactions on engineering management : EM 1 IMES discussion paper series / Englische Ausgabe 1
more ... less ...
Source
All
ECONIS (ZBW) 80 Other ZBW resources 39 RePEc 20 BASE 9 EconStor 3
Showing 91 - 100 of 151
Cover Image
Tu-vera: An Encryption Algorithm Using Propositional Logic Calculus
Vargas-Vera, Maria - In: International Journal of Smart Education and Urban … 9 (2018) 2, pp. 49-59
This article describes how the encryption algorithm (called Tu-vera) depends on the transformation of a phrase written in English into a sequence of propositional logic formulas which can be understand by a human receiver. This happens if the receiver has a set of reserved words and he/she knows...
Persistent link: https://www.econbiz.de/10012047748
Saved in:
Cover Image
A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations
Zhou, Xiaoyi; Ma, Jixin; Yao, Xiaoming; Li, Honglei - In: International Journal of Software Innovation (IJSI) 6 (2018) 2, pp. 1-9
is based on quantum cryptography, thus it is robust enough to resist the existing attacks and has high security. …
Persistent link: https://www.econbiz.de/10012047808
Saved in:
Cover Image
Probably Secure Efficient Anonymous Credential Scheme
Wu, Chien-Nan; Fan, Chun-I; Huang, Jheng-Jia; Tseng, Yi-Fan - In: International Journal of Software Innovation (IJSI) 6 (2018) 3, pp. 18-35
This article describes how after the concept of anonymous credential systems was introduced in 1985, a number of similar systems have been proposed. However, these systems use zero-knowledge protocols to authenticate users, resulting in inefficient authentication during the stage of proving...
Persistent link: https://www.econbiz.de/10012047815
Saved in:
Cover Image
Economic incentives and Blockchain security
Freund, Andreas - In: Journal of securities operations & custody 10 (2017/2018) 1, pp. 67-76
Persistent link: https://www.econbiz.de/10011855612
Saved in:
Cover Image
The evolution of blockchain technology in data management
Chavali, L. N. - In: GITAM journal of management : a quarterly publication … 16 (2018) 4, pp. 49-58
Persistent link: https://www.econbiz.de/10012050734
Saved in:
Cover Image
Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks
Abdulkader, Zaid A.; Azizol Abdullah; Mohd Taufik Abdullah - In: International journal of networking and virtual … 19 (2018) 2/3/4, pp. 153-175
Persistent link: https://www.econbiz.de/10011981136
Saved in:
Cover Image
Applicability of Cellular Automata in Cryptanalysis
Bhasin, Harsh; Alam, Naved - In: International Journal of Applied Metaheuristic … 8 (2017) 2, pp. 38-48
Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to finding the correct key from a set of possible keys, which is basically a search problem. Many researchers have put in a lot of effort to accomplish this task. Most of the efforts used conventional...
Persistent link: https://www.econbiz.de/10012042945
Saved in:
Cover Image
A Tenable Approach for Protection of Electronic Medical Records Using Thermal Image Watermarking
Mohan, Mamtha; Sujatha, B. K. - In: International Journal of Biomedical and Clinical … 6 (2017) 2, pp. 46-61
using watermarking and Visual Cryptography (VC). The proposed scheme offers a complete protection framework for the facial …
Persistent link: https://www.econbiz.de/10012043234
Saved in:
Cover Image
Modification of Traditional RSA into Symmetric-RSA Cryptosystems
Mohit, Prerna; Biswas, G. P. - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 66-73
This paper addresses the modification of RSA cryptography namely Symmetric-RSA, which seem to be equally useful for …
Persistent link: https://www.econbiz.de/10012043271
Saved in:
Cover Image
On the Pixel Expansion of Visual Cryptography Scheme
Liu, Feng; Guo, Teng; Jiao, Jian; Wang, Wen - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 2, pp. 38-44
cryptography schemes(VCSs) for more kinds of graph access structures, in which we require that a subset of parties can determine …
Persistent link: https://www.econbiz.de/10012043942
Saved in:
  • First
  • Prev
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...