EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"cryptography"
Narrow search

Narrow search

Year of publication
Subject
All
Cryptography 61 Data security 47 Datensicherheit 47 Blockchain 42 cryptography 31 Virtual currency 29 Virtuelle Währung 29 Kryptographie 19 Datenschutz 14 Data protection 12 Electronic payment 12 Elektronisches Zahlungsmittel 12 Financial technology 11 Finanztechnologie 11 Cloud Computing 10 Visual Cryptography 10 Cloud computing 9 Computerized method 9 Computerunterstützung 9 IT crime 9 IT-Kriminalität 9 blockchain 8 Artificial intelligence 7 Bitcoin 7 Künstliche Intelligenz 7 Algorithm 6 Digitalisierung 6 Digitization 6 quantum computing 6 Algorithmus 5 Authentication 5 Cybersecurity 5 E-commerce 5 Electronic Commerce 5 Information technology 5 Informationstechnik 5 Payment transactions 5 Security 5 Theorie 5 Theory 5
more ... less ...
Online availability
All
Undetermined 87 Free 45 CC license 5
Type of publication
All
Article 110 Book / Working Paper 39 Other 5
Type of publication (narrower categories)
All
Article in journal 44 Aufsatz in Zeitschrift 44 Graue Literatur 15 Non-commercial literature 15 Working Paper 12 Arbeitspapier 11 Konferenzschrift 7 Aufsatz im Buch 6 Book section 6 Article 2 Handbook 2 Handbuch 2 Thesis 2 research-article 2 Case study 1 Congress Report 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 review 1 technical-paper 1
more ... less ...
Language
All
English 129 Undetermined 17 German 4 Spanish 3 Romanian 1
Author
All
Auer, Raphael A. 3 Liu, Lintao 3 Lu, Yuliang 3 Yan, Xuehu 3 Borisov, Nikita 2 Conesa, Carlos 2 Cristina, Dascalescu Ana 2 Diaz, Claudia 2 Dupont, Angela 2 Dutta, Paramartha 2 Echandouri, Bouchra 2 Günther, Oliver 2 Hanl, Andreas 2 Kan, Kazutoshi 2 Li, Yang 2 Lipton, Alexander 2 Liu, Feng 2 López Chamorro, Noemí 2 Mandal, J. K. 2 Manickam, Adhiyaman 2 Milne, Alistair 2 Mukhopadhyay, Somnath 2 Muthuswamy, Padmakumar 2 Omary, Fouzia 2 Padala, Preethi 2 Radu, Boriga 2 Ramkumar, Mahalingam 2 Rao, S. Krishna 2 Saini, Hemraj 2 Sarella, Venkata Ramana 2 Sathishkumar V. E. 2 Sharma, Anand 2 Singh, Amit Kumar 2 Singh, Jyoti Prakash 2 Singh, Maheshwari Prasad 2 Une, Masashi 2 Valko, Andras 2 Wan, Song 2 Xiong, Jin 2 Zeng, Guihua 2
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 International Conference on Computational Intelligence in Communications and Business Analytics <6., 2024, Patna> 2 Center for Operations Research and Econometrics (CORE), École des Sciences Économiques de Louvain 1 CoDecFin <2., 2021, Online> 1 College of Health and Science 1 DeFi <1., 2021, Online> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 Digital Technologies in Teaching and Learning Strategies <Veranstaltung> <2021, Rostow am Don> 1 EconWPA 1 Fachbereich Rechts- und Wirtschaftswissenschaften, Technische Universität Darmstadt 1 FinanzBuch Verlag 1 Macquarie University 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 School of Computing and Mathematics 1 University of Western Sydney 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Information Security and Privacy (IJISP) 8 International Journal of Digital Crime and Forensics (IJDCF) 7 Physica A: Statistical Mechanics and its Applications 5 Electronic commerce research 3 Informatica Economica 3 International Journal of Rough Sets and Data Analysis (IJRSDA) 3 International journal of business information systems : IJBIS 3 Lecture notes in computer science 3 BIS papers 2 Communications in Computer and Information Science 2 Documentos ocasionales / Banco de España 2 Financial Mathematics and Fintech 2 International Journal of Business Data Communications and Networking (IJBDCN) 2 International Journal of Handheld Computing Research (IJHCR) 2 International Journal of Software Innovation (IJSI) 2 International journal of information systems and supply chain management : IJISSCM ; an official publication of the Information Resources Management Association 2 International journal of networking and virtual organisations : IJNVO 2 Journal of Enterprise Information Management 2 Journal of securities operations & custody 2 Logistics 2 Ovidius University Annals, Economic Sciences Series 2 Springer eBook Collection 2 The Emerald handbook of blockchain for business 2 Acta Carolus Robertus 1 Annales Universitatis Apulensis Series Oeconomica 1 Annals of the Institute of Statistical Mathematics 1 Business & Information Systems Engineering 1 CORE Discussion Papers 1 Climate policy 1 Data Technologies and Applications 1 Defence and peace economics 1 Deutschland Digital - Sicher - BSI 1 Development and Comp Systems 1 Discussion papers / CEPR 1 Economic bulletin 1 GITAM journal of management : a quarterly publication of GITAM Institute of Management 1 Gen Z's Fashion Revolution : Understanding the influence of Gen Z on Fashion Brands 1 Global Value Chains in Latin America : Experiences of Transformations 1 Homo oeconomicus 1 IEEE transactions on engineering management : EM 1
more ... less ...
Source
All
ECONIS (ZBW) 83 Other ZBW resources 39 RePEc 20 BASE 9 EconStor 3
Showing 81 - 90 of 154
Cover Image
Cryptoassets : potential implications for financial stability
Kalfaoglou, Faidon - In: Economic bulletin 50 (2019), pp. 111-134
Persistent link: https://www.econbiz.de/10012319695
Saved in:
Cover Image
BITCOIN – THE NEW KIND OF MONEY
SUDACEVSCHI, Mihaela - In: Management Intercultural (2013) 29, pp. 340-348
Bitcoin is a new kind of money, which means a digital currency which can be used for commercial purposes. Over time, the trade has evolved from barter to the use of the precious metals as money, then to the coins with intrinsic value and to the symbol coins and later to the use of the electronic...
Persistent link: https://www.econbiz.de/10010700624
Saved in:
Cover Image
ADATBIZTONSÁG AZ RFID ALKALMAZÁSAKOR
Radványi, Tibor - In: Acta Carolus Robertus 03 (2013) 1
Ebben a cikkben az RFID (Rádiófrekvenciás azonosítás) technológia használata által felvetett adatbiztonsági kérdések kerülnek megtárgyalásra. Milyen támadási lehetőségek vannak, és milyen védekezési lépéseket tehetünk ezek kivédésére. Egy termék számtalan veszélynek...
Persistent link: https://www.econbiz.de/10011070280
Saved in:
Cover Image
Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud
Dorgham, O.; Al-Rahamneh, Banan; Al-Hadidi, Moh'd; … - In: International Journal of Cloud Applications and … 8 (2018) 1, pp. 154-172
Medical image information can be exchanged remotely through cloud-based medical imaging services. Digital Imaging and Communication in Medicine (DICOM) is considered to be the most commonly used medical image format among hospitals. The objective of this article is to enhance the secure transfer...
Persistent link: https://www.econbiz.de/10012043392
Saved in:
Cover Image
Image Secret Sharing Construction for General Access Structure with Meaningful Share
Yan, Xuehu; Lu, Yuliang; Liu, Lintao; Ma, Duohe - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 3, pp. 66-77
This article describes how the (k, n) threshold image secret sharing technology can recover the secret image even n − k shares are lost, or n−k servers do not work, which is useful for cloud storage, etc. Image secret sharing for general access structure (GAS) is more general than (k, n)...
Persistent link: https://www.econbiz.de/10012043977
Saved in:
Cover Image
An Improved Encryption Scheme for Traitor Tracing from Lattice
Ye, Qing; Hu, Mingxing; Chen, Guangxuan; Qin, Panke - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 4, pp. 21-35
This article first describes a paper by Ling, Phan, and Stehle at the CRYPTO 2014 which presented the first encryption scheme for traitor tracing from lattice, and the scheme is almost as efficient as the learning with errors (LWE) encryption. However, their scheme is not constructed on an...
Persistent link: https://www.econbiz.de/10012043981
Saved in:
Cover Image
An Encryption Methodology for Enabling the Use of Data Warehouses on the Cloud
Lopes, Claudivan Cruz; Cesário-Times, Valéria; … - In: International Journal of Data Warehousing and Mining (IJDWM) 14 (2018) 4, pp. 38-66
cryptography. In this article, the authors propose an encryption methodology for a cloud DW stored according to the star schema …
Persistent link: https://www.econbiz.de/10012044251
Saved in:
Cover Image
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security
Singh, Ranjeet Kumar; Shaw, Dilip Kumar - In: International Journal of Information Security and … 12 (2018) 1, pp. 1-12
use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique … cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are …
Persistent link: https://www.econbiz.de/10012045704
Saved in:
Cover Image
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
Kumar, Gautam; Saini, Hemraj - In: International Journal of Information Security and … 12 (2018) 1, pp. 13-28
The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the …
Persistent link: https://www.econbiz.de/10012045705
Saved in:
Cover Image
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
Saini, Hemraj; Rathee, Geetanjali - In: International Journal of Information Security and … 12 (2018) 1, pp. 42-52
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication...
Persistent link: https://www.econbiz.de/10012045707
Saved in:
  • First
  • Prev
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...