EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"cryptography"
Narrow search

Narrow search

Year of publication
Subject
All
Cryptography 59 Data security 46 Datensicherheit 46 Blockchain 40 cryptography 31 Virtual currency 28 Virtuelle Währung 28 Kryptographie 19 Datenschutz 14 Data protection 12 Electronic payment 12 Elektronisches Zahlungsmittel 12 Financial technology 11 Finanztechnologie 11 Cloud Computing 10 Visual Cryptography 10 Cloud computing 9 Computerized method 8 Computerunterstützung 8 IT crime 8 IT-Kriminalität 8 blockchain 8 Artificial intelligence 7 Bitcoin 7 Künstliche Intelligenz 7 Algorithm 6 Digitalisierung 6 Digitization 6 Algorithmus 5 Authentication 5 Cybersecurity 5 E-commerce 5 Electronic Commerce 5 Information technology 5 Informationstechnik 5 Payment transactions 5 Security 5 Theorie 5 Theory 5 Vertrauen 5
more ... less ...
Online availability
All
Undetermined 86 Free 43 CC license 4
Type of publication
All
Article 108 Book / Working Paper 38 Other 5
Type of publication (narrower categories)
All
Article in journal 43 Aufsatz in Zeitschrift 43 Graue Literatur 14 Non-commercial literature 14 Working Paper 12 Arbeitspapier 11 Konferenzschrift 7 Aufsatz im Buch 5 Book section 5 Article 2 Handbook 2 Handbuch 2 Thesis 2 research-article 2 Case study 1 Congress Report 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 review 1 technical-paper 1
more ... less ...
Language
All
English 126 Undetermined 17 German 4 Spanish 3 Romanian 1
Author
All
Liu, Lintao 3 Lu, Yuliang 3 Yan, Xuehu 3 Auer, Raphael A. 2 Borisov, Nikita 2 Conesa, Carlos 2 Cristina, Dascalescu Ana 2 Diaz, Claudia 2 Dutta, Paramartha 2 Echandouri, Bouchra 2 Günther, Oliver 2 Hanl, Andreas 2 Kan, Kazutoshi 2 Lipton, Alexander 2 Liu, Feng 2 López Chamorro, Noemí 2 Mandal, J. K. 2 Milne, Alistair 2 Mukhopadhyay, Somnath 2 Muthuswamy, Padmakumar 2 Omary, Fouzia 2 Padala, Preethi 2 Radu, Boriga 2 Ramkumar, Mahalingam 2 Rao, S. Krishna 2 Saini, Hemraj 2 Sarella, Venkata Ramana 2 Sharma, Anand 2 Singh, Amit Kumar 2 Singh, Jyoti Prakash 2 Singh, Maheshwari Prasad 2 Une, Masashi 2 Wan, Song 2 Xiong, Jin 2 Zeng, Guihua 2 Zheng, Zhiyong 2 Zhou, Nanrun 2 Zhu, Fuchen 2 Abdulkader, Zaid A. 1 Abercrombie, Robert K 1
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 International Conference on Computational Intelligence in Communications and Business Analytics <6., 2024, Patna> 2 Center for Operations Research and Econometrics (CORE), École des Sciences Économiques de Louvain 1 CoDecFin <2., 2021, Online> 1 College of Health and Science 1 DeFi <1., 2021, Online> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 Digital Technologies in Teaching and Learning Strategies <Veranstaltung> <2021, Rostow am Don> 1 EconWPA 1 Fachbereich Rechts- und Wirtschaftswissenschaften, Technische Universität Darmstadt 1 FinanzBuch Verlag 1 Macquarie University 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 School of Computing and Mathematics 1 University of Western Sydney 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Information Security and Privacy (IJISP) 8 International Journal of Digital Crime and Forensics (IJDCF) 7 Physica A: Statistical Mechanics and its Applications 5 Electronic commerce research 3 Informatica Economica 3 International Journal of Rough Sets and Data Analysis (IJRSDA) 3 International journal of business information systems : IJBIS 3 Lecture notes in computer science 3 Communications in Computer and Information Science 2 Documentos ocasionales / Banco de España 2 Financial Mathematics and Fintech 2 International Journal of Business Data Communications and Networking (IJBDCN) 2 International Journal of Handheld Computing Research (IJHCR) 2 International Journal of Software Innovation (IJSI) 2 International journal of networking and virtual organisations : IJNVO 2 Journal of Enterprise Information Management 2 Journal of securities operations & custody 2 Logistics 2 Ovidius University Annals, Economic Sciences Series 2 Springer eBook Collection 2 The Emerald handbook of blockchain for business 2 Acta Carolus Robertus 1 Annales Universitatis Apulensis Series Oeconomica 1 Annals of the Institute of Statistical Mathematics 1 BIS papers 1 Business & Information Systems Engineering 1 CORE Discussion Papers 1 Climate policy 1 Data Technologies and Applications 1 Decision analytics journal 1 Defence and peace economics 1 Deutschland Digital - Sicher - BSI 1 Development and Comp Systems 1 Discussion papers / CEPR 1 Economic bulletin 1 GITAM journal of management : a quarterly publication of GITAM Institute of Management 1 Global Value Chains in Latin America : Experiences of Transformations 1 Homo oeconomicus 1 IEEE transactions on engineering management : EM 1 IMES discussion paper series / Englische Ausgabe 1
more ... less ...
Source
All
ECONIS (ZBW) 80 Other ZBW resources 39 RePEc 20 BASE 9 EconStor 3
Showing 111 - 120 of 151
Cover Image
Improved secure RSA crytosystem for data confidentiality in cloud
Thangavel, M.; Varalakshmi, P. - In: International journal of information systems and change … 9 (2017) 4, pp. 261-277
Persistent link: https://www.econbiz.de/10011858355
Saved in:
Cover Image
Survey of the Use of Steganography over the Internet
Lavinia Mihaela DINCÄ‚ - In: Informatica Economica 15 (2011) 2, pp. 153-164
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet...
Persistent link: https://www.econbiz.de/10009416382
Saved in:
Cover Image
A Novel Pseudo-random Bit Generator Based on a New Couple of Chaotic Systems
Cristina, Dascalescu Ana; Radu, Boriga - In: Ovidius University Annals, Economic Sciences Series XI (2011) 1, pp. 553-558
required a better level of security of the economic data, reason for what the role of cryptography is becoming increasingly …
Persistent link: https://www.econbiz.de/10010632237
Saved in:
Cover Image
A Novel Pseudo-random Bit Generator Based on Some Transcendental Chaotic Systems
Radu, Boriga; Cristina, Dascalescu Ana - In: Ovidius University Annals, Economic Sciences Series XI (2011) 1, pp. 208-212
Chaotic maps have attracted great interest for its special use in secure communication systems. It is proved that for some chaotic maps defined by we can find an analytical solution, so systems can leads to predictability. In this letter, we propose a new kind of chaotic map based on...
Persistent link: https://www.econbiz.de/10010632246
Saved in:
Cover Image
Basic Visual Cryptography Using Braille
Wang, Guangyu; Liu, Feng; Yan, Wei Qi - In: International Journal of Digital Crime and Forensics (IJDCF) 8 (2016) 3, pp. 85-93
As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the …
Persistent link: https://www.econbiz.de/10012043929
Saved in:
Cover Image
Implementation and Evaluation of Steganography Based Online Voting System
Issac, Biju; Rura, Lauretha; Haldar, Manas Kumar - In: International Journal of Electronic Government Research … 12 (2016) 3, pp. 71-93
voting by combining visual cryptography with image steganography to enhance system security without degrading system …
Persistent link: https://www.econbiz.de/10012044371
Saved in:
Cover Image
Securing Mobile Ad Hoc Networks: Challenges and Solutions
Kumar, Sunil; Dutta, Kamlesh - In: International Journal of Handheld Computing Research (IJHCR) 7 (2016) 1, pp. 26-76
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are...
Persistent link: https://www.econbiz.de/10012045152
Saved in:
Cover Image
Threshold Secret Sharing Scheme for Compartmented Access Structures
Fathimal, P. Mohamed; Rani, P. Arockia Jansi - In: International Journal of Information Security and … 10 (2016) 3, pp. 1-9
In the realm of visual cryptography, secret sharing is the predominant method of transmission and reception of secure …
Persistent link: https://www.econbiz.de/10012045676
Saved in:
Cover Image
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks
Babu, Erukala Suresh; Nagaraju, C.; Prasad, M.H.M. Krishna - In: International Journal of Information Security and … 10 (2016) 3, pp. 42-66
using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the … underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates …
Persistent link: https://www.econbiz.de/10012045679
Saved in:
Cover Image
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN
Yassine, Maleh; Ezzati, Abdellah - In: International Journal of Mobile Computing and … 7 (2016) 3, pp. 42-66
cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Their evaluations on TOSSIM give a precise and … other cryptography schemes in literature. …
Persistent link: https://www.econbiz.de/10012046459
Saved in:
  • First
  • Prev
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...