EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"cryptography"
Narrow search

Narrow search

Year of publication
Subject
All
Cryptography 59 Data security 46 Datensicherheit 46 Blockchain 40 cryptography 31 Virtual currency 28 Virtuelle Währung 28 Kryptographie 19 Datenschutz 14 Data protection 12 Electronic payment 12 Elektronisches Zahlungsmittel 12 Financial technology 11 Finanztechnologie 11 Cloud Computing 10 Visual Cryptography 10 Cloud computing 9 Computerized method 8 Computerunterstützung 8 IT crime 8 IT-Kriminalität 8 blockchain 8 Artificial intelligence 7 Bitcoin 7 Künstliche Intelligenz 7 Algorithm 6 Digitalisierung 6 Digitization 6 Algorithmus 5 Authentication 5 Cybersecurity 5 E-commerce 5 Electronic Commerce 5 Information technology 5 Informationstechnik 5 Payment transactions 5 Security 5 Theorie 5 Theory 5 Vertrauen 5
more ... less ...
Online availability
All
Undetermined 86 Free 43 CC license 4
Type of publication
All
Article 108 Book / Working Paper 38 Other 5
Type of publication (narrower categories)
All
Article in journal 43 Aufsatz in Zeitschrift 43 Graue Literatur 14 Non-commercial literature 14 Working Paper 12 Arbeitspapier 11 Konferenzschrift 7 Aufsatz im Buch 5 Book section 5 Article 2 Handbook 2 Handbuch 2 Thesis 2 research-article 2 Case study 1 Congress Report 1 Fallstudie 1 Gesetz 1 Hochschulschrift 1 Law 1 Ratgeber 1 review 1 technical-paper 1
more ... less ...
Language
All
English 126 Undetermined 17 German 4 Spanish 3 Romanian 1
Author
All
Liu, Lintao 3 Lu, Yuliang 3 Yan, Xuehu 3 Auer, Raphael A. 2 Borisov, Nikita 2 Conesa, Carlos 2 Cristina, Dascalescu Ana 2 Diaz, Claudia 2 Dutta, Paramartha 2 Echandouri, Bouchra 2 Günther, Oliver 2 Hanl, Andreas 2 Kan, Kazutoshi 2 Lipton, Alexander 2 Liu, Feng 2 López Chamorro, Noemí 2 Mandal, J. K. 2 Milne, Alistair 2 Mukhopadhyay, Somnath 2 Muthuswamy, Padmakumar 2 Omary, Fouzia 2 Padala, Preethi 2 Radu, Boriga 2 Ramkumar, Mahalingam 2 Rao, S. Krishna 2 Saini, Hemraj 2 Sarella, Venkata Ramana 2 Sharma, Anand 2 Singh, Amit Kumar 2 Singh, Jyoti Prakash 2 Singh, Maheshwari Prasad 2 Une, Masashi 2 Wan, Song 2 Xiong, Jin 2 Zeng, Guihua 2 Zheng, Zhiyong 2 Zhou, Nanrun 2 Zhu, Fuchen 2 Abdulkader, Zaid A. 1 Abercrombie, Robert K 1
more ... less ...
Institution
All
FC <Veranstaltung> <25., 2021, Online> 3 Springer-Verlag GmbH 3 International Conference on Computational Intelligence in Communications and Business Analytics <6., 2024, Patna> 2 Center for Operations Research and Econometrics (CORE), École des Sciences Économiques de Louvain 1 CoDecFin <2., 2021, Online> 1 College of Health and Science 1 DeFi <1., 2021, Online> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 1 Digital Technologies in Teaching and Learning Strategies <Veranstaltung> <2021, Rostow am Don> 1 EconWPA 1 Fachbereich Rechts- und Wirtschaftswissenschaften, Technische Universität Darmstadt 1 FinanzBuch Verlag 1 Macquarie University 1 National Bureau of Economic Research 1 Nomos Verlagsgesellschaft 1 OECD 1 School of Computing and Mathematics 1 University of Western Sydney 1 VOTING <6., 2021, Online> 1 Verlag C.H. Beck 1 WTSC <5., 2021, Online> 1 Wiley-VCH 1 Wirtschaftsuniversität Wien / Forschungsinstitut für Kryptoökonomie 1
more ... less ...
Published in...
All
International Journal of Information Security and Privacy (IJISP) 8 International Journal of Digital Crime and Forensics (IJDCF) 7 Physica A: Statistical Mechanics and its Applications 5 Electronic commerce research 3 Informatica Economica 3 International Journal of Rough Sets and Data Analysis (IJRSDA) 3 International journal of business information systems : IJBIS 3 Lecture notes in computer science 3 Communications in Computer and Information Science 2 Documentos ocasionales / Banco de España 2 Financial Mathematics and Fintech 2 International Journal of Business Data Communications and Networking (IJBDCN) 2 International Journal of Handheld Computing Research (IJHCR) 2 International Journal of Software Innovation (IJSI) 2 International journal of networking and virtual organisations : IJNVO 2 Journal of Enterprise Information Management 2 Journal of securities operations & custody 2 Logistics 2 Ovidius University Annals, Economic Sciences Series 2 Springer eBook Collection 2 The Emerald handbook of blockchain for business 2 Acta Carolus Robertus 1 Annales Universitatis Apulensis Series Oeconomica 1 Annals of the Institute of Statistical Mathematics 1 BIS papers 1 Business & Information Systems Engineering 1 CORE Discussion Papers 1 Climate policy 1 Data Technologies and Applications 1 Decision analytics journal 1 Defence and peace economics 1 Deutschland Digital - Sicher - BSI 1 Development and Comp Systems 1 Discussion papers / CEPR 1 Economic bulletin 1 GITAM journal of management : a quarterly publication of GITAM Institute of Management 1 Global Value Chains in Latin America : Experiences of Transformations 1 Homo oeconomicus 1 IEEE transactions on engineering management : EM 1 IMES discussion paper series / Englische Ausgabe 1
more ... less ...
Source
All
ECONIS (ZBW) 80 Other ZBW resources 39 RePEc 20 BASE 9 EconStor 3
Showing 81 - 90 of 151
Cover Image
Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud
Dorgham, O.; Al-Rahamneh, Banan; Al-Hadidi, Moh'd; … - In: International Journal of Cloud Applications and … 8 (2018) 1, pp. 154-172
Medical image information can be exchanged remotely through cloud-based medical imaging services. Digital Imaging and Communication in Medicine (DICOM) is considered to be the most commonly used medical image format among hospitals. The objective of this article is to enhance the secure transfer...
Persistent link: https://www.econbiz.de/10012043392
Saved in:
Cover Image
Image Secret Sharing Construction for General Access Structure with Meaningful Share
Yan, Xuehu; Lu, Yuliang; Liu, Lintao; Ma, Duohe - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 3, pp. 66-77
This article describes how the (k, n) threshold image secret sharing technology can recover the secret image even n − k shares are lost, or n−k servers do not work, which is useful for cloud storage, etc. Image secret sharing for general access structure (GAS) is more general than (k, n)...
Persistent link: https://www.econbiz.de/10012043977
Saved in:
Cover Image
An Improved Encryption Scheme for Traitor Tracing from Lattice
Ye, Qing; Hu, Mingxing; Chen, Guangxuan; Qin, Panke - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 4, pp. 21-35
This article first describes a paper by Ling, Phan, and Stehle at the CRYPTO 2014 which presented the first encryption scheme for traitor tracing from lattice, and the scheme is almost as efficient as the learning with errors (LWE) encryption. However, their scheme is not constructed on an...
Persistent link: https://www.econbiz.de/10012043981
Saved in:
Cover Image
An Encryption Methodology for Enabling the Use of Data Warehouses on the Cloud
Lopes, Claudivan Cruz; Cesário-Times, Valéria; … - In: International Journal of Data Warehousing and Mining (IJDWM) 14 (2018) 4, pp. 38-66
cryptography. In this article, the authors propose an encryption methodology for a cloud DW stored according to the star schema …
Persistent link: https://www.econbiz.de/10012044251
Saved in:
Cover Image
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security
Singh, Ranjeet Kumar; Shaw, Dilip Kumar - In: International Journal of Information Security and … 12 (2018) 1, pp. 1-12
use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique … cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are …
Persistent link: https://www.econbiz.de/10012045704
Saved in:
Cover Image
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
Kumar, Gautam; Saini, Hemraj - In: International Journal of Information Security and … 12 (2018) 1, pp. 13-28
The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the …
Persistent link: https://www.econbiz.de/10012045705
Saved in:
Cover Image
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
Saini, Hemraj; Rathee, Geetanjali - In: International Journal of Information Security and … 12 (2018) 1, pp. 42-52
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication...
Persistent link: https://www.econbiz.de/10012045707
Saved in:
Cover Image
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm
Echandouri, Bouchra; Omary, Fouzia; Ziani, Fatima Ezzahra; … - In: International Journal of Information Security and … 12 (2018) 3, pp. 16-26
This article describes how the simplicity of data transmission made eavesdropping by malicious people easier. This became one the flaws of computer security that needs to be handled. In order to establish a secure data communication, many data security techniques were developed to ensure...
Persistent link: https://www.econbiz.de/10012045717
Saved in:
Cover Image
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO)
Hanin, Charifa; Omary, Fouzia; Elbernoussi, Souad; … - In: International Journal of Information Security and … 12 (2018) 4, pp. 54-67
The communication of private information is very dangerous, since unauthorized entities can intercept it. Thus, encryption is one of the principal information security solutions that helps keep information confidentiality. This latter can be satisfied by the use of various encryption techniques,...
Persistent link: https://www.econbiz.de/10012045727
Saved in:
Cover Image
Secure Mechanisms for Key Shares in Cloud Computing
Buchade, Amar; Ingle, Rajesh - In: International Journal of Rough Sets and Data Analysis … 5 (2018) 3, pp. 21-41
The protection of the key is important due to the vulnerabilities which exist in cloud computing. In this article, algorithms and techniques for protection of the key in cloud computing are proposed. The algorithms to select the number of virtual machines is presented to protect the key. The...
Persistent link: https://www.econbiz.de/10012047414
Saved in:
  • First
  • Prev
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...