EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"decryption"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 7 Datensicherheit 7 Decryption 7 Encryption 7 decryption 6 encryption 6 Cloud Computing 5 Data protection 5 Datenschutz 5 Cloud computing 4 cloud computing 3 Algorithm 2 Algorithmus 2 Bigdata 2 Biometric 2 Cassandra 2 Chaos 2 Cloud 2 Security 2 cloud 2 AES 1 AES Modified Algorithm 1 AWS 1 Bitnami 1 Bletchley Park 1 Blockchain 1 Brute-Force 1 CRT 1 CSP 1 CSTA 1 China 1 Chinese remainder theorem 1 Cloud Databases 1 Cloud Service Provider 1 Computer network 1 Computernetz 1 Credibility 1 Cryptography 1 Data Owner 1 Dechiffrierung 1
more ... less ...
Online availability
All
Undetermined 14 Free 3
Type of publication
All
Article 20 Book / Working Paper 2
Type of publication (narrower categories)
All
Article in journal 10 Aufsatz in Zeitschrift 10 Aufsatz im Buch 1 Book section 1 Conference paper 1 Konferenzbeitrag 1
Language
All
English 21 Undetermined 1
Author
All
Gupta, Sangeeta 3 ALEXE, Iulian 1 Abdelkader, Gafour 1 Agarwal, Shubham 1 Agarwal, Sugandha 1 Al-Turjman, Fadi 1 Amine, Filali Mohamed 1 Arunarani, Ar 1 Beni-Hssane, Abderrahim 1 El Makkaoui, Khalid 1 Ezzati, Abdellah 1 Geetha, S 1 Grey, Christopher 1 Gugulothu, Narsimha 1 Hilituha, D.V. 1 Ibharalu, Thomas 1 Infanteena, A Magnus 1 Kalaiselvi, R. 1 Kavitha, V. 1 Kumar, R. Lakshmana 1 Lakhera, Manmohan 1 Lakyda, P.I. 1 Lawal, Oluwafunmilayo 1 Mohanasundaram, R. 1 Murugesan, Arun 1 NEAMÞU, Mircea Iosif 1 Nagaria, Deepak 1 Namasudra, Suyel 1 Narsimha, G. 1 Ogunjobi, Adebayo 1 Onashoga, Adebukola 1 Perkinian, D Manjula 1 Prathap, R. 1 Punithavathi, P 1 Qiu, Jianxin 1 Rauthan, Manmohan Singh 1 Roy, Pinki 1 Saminathan, Balamurali 1 Saravenan, S. 1 Sindhu, S Siva Sivatha 1
more ... less ...
Institution
All
Facultatea de Cibernetica, Statistica şi Informatica Economica, Academia de Studii Economice din Bucureşti 1
Published in...
All
International Journal of Cloud Applications and Computing (IJCAC) 2 African journal of science, technology, innovation & development : AJSTID 1 Balanced Nature Using 1 Indian journal of economics & business : IJEB 1 International Journal of Information Communication Technologies and Human Development (IJICTHD) 1 International Journal of Information Security and Privacy (IJISP) 1 International Journal of Intelligent Information Technologies (IJIIT) 1 International Journal of Organizational and Collective Intelligence (IJOCI) 1 International Journal of Rough Sets and Data Analysis (IJRSDA) 1 International journal of business information systems : IJBIS 1 International journal of business process integration and management : IJBPIM 1 International journal of electronic business : IJEB 1 International journal of enterprise network management 1 International journal of information systems and change management : IJISCM 1 International journal of intelligent enterprise 1 International journal of intelligent enterprise : IJIE 1 International journal of product development : IJPD 1 Journal of Organizational and End User Computing (JOEUC) 1 Proceedings of the 5th International Conference on Knowledge Management: Projects, Systems and Technologies,Bucharest, November 12-13 2010 1 Proceedings of the Second International Forum on Financial Mathematics and Financial Technology 1
more ... less ...
Source
All
ECONIS (ZBW) 11 Other ZBW resources 8 RePEc 2 USB Cologne (EcoSocSci) 1
Showing 11 - 20 of 22
Did you mean: subject:"description" (3,763 results)
Cover Image
Intelligent Techniques for Providing Effective Security to Cloud Databases
Arunarani, Ar; Perkinian, D Manjula - In: International Journal of Intelligent Information … 14 (2018) 1, pp. 1-16
with decryption from the cloud databases. The major advantage of this retrieval model is in terms of its improved query …
Persistent link: https://www.econbiz.de/10012045514
Saved in:
Cover Image
A Literature Review on Image Encryption Techniques
Geetha, S; Punithavathi, P; Infanteena, A Magnus; … - In: International Journal of Information Security and … 12 (2018) 3, pp. 42-83
Encryption is one of the techniques that ensure the security of images used in various domains like military intelligence, secure medical imaging services, intranet and internet communication, e-banking, social networking image communication like Facebook, WhatsApp, Twitter etc. All these images...
Persistent link: https://www.econbiz.de/10012045719
Saved in:
Cover Image
Securing Stored Biometric Template Using Cryptographic Algorithm
Lakhera, Manmohan; Rauthan, Manmohan Singh - In: International Journal of Rough Sets and Data Analysis … 5 (2018) 4, pp. 48-60
The biometric template protection technique provides the security in many authentication applications. Authentication based on biometrics has more advantages over traditional methods such as password and token-based authentication methods. The advantage of any biometric-based authentication...
Persistent link: https://www.econbiz.de/10012047420
Saved in:
Cover Image
PpBAC: Popularity Based Access Control Model for Cloud Computing
Namasudra, Suyel; Roy, Pinki - In: Journal of Organizational and End User Computing (JOEUC) 30 (2018) 4, pp. 14-31
This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access...
Persistent link: https://www.econbiz.de/10012049254
Saved in:
Cover Image
Miscegenation of scalable and DEP3K performance evaluation of nosql-cassandra for bigdata applications deployed in cloud
Gupta, Sangeeta; Narsimha, G. - In: International journal of business process integration … 9 (2018) 1, pp. 12-21
Persistent link: https://www.econbiz.de/10011914130
Saved in:
Cover Image
Biometric Image Security Using Chaos Algorithm
Agarwal, Sugandha; Singh, O.P.; Nagaria, Deepak - In: International Journal of Information Communication … 9 (2017) 2, pp. 49-57
In this world of Advanced Technology, the Biometrics are proved to be a significant method for user identification. However, the use of biometric is not new, but these days, with the increase in multimedia applications, it has gained its popularity in analysing human characteristics for security...
Persistent link: https://www.econbiz.de/10012045380
Saved in:
Cover Image
Hybrid Approach of Modified AES
Amine, Filali Mohamed; Abdelkader, Gafour - In: International Journal of Organizational and Collective … 7 (2017) 4, pp. 83-93
Advanced Encryption Standard is one of the most popular symmetric key encryption algorithms to many works, which have employed to implement modified AES. In this paper, the modification that has been proposed on AES algorithm that has been developed to decrease its time complexity on bulky data...
Persistent link: https://www.econbiz.de/10012046776
Saved in:
Cover Image
Improved secure RSA crytosystem for data confidentiality in cloud
Thangavel, M.; Varalakshmi, P. - In: International journal of information systems and change … 9 (2017) 4, pp. 261-277
Persistent link: https://www.econbiz.de/10011858355
Saved in:
Cover Image
A secure framework for SMS-based service delivery in m-government using a multicast encryption scheme
Onashoga, Adebukola; Ogunjobi, Adebayo; Ibharalu, Thomas; … - In: African journal of science, technology, innovation & … 8 (2016) 3/4, pp. 247-255
Persistent link: https://www.econbiz.de/10011723579
Saved in:
Cover Image
SIE-SECURITY
NEAMÞU, Mircea Iosif; ALEXE, Iulian - Facultatea de Cibernetica, Statistica şi Informatica … - 2010
The purpose of this paper is to present the application named SIE-Security providing web programmers with a tool that searches vulnerable links within their web site (i.e. a product page), attempting to perform an SQL Injection and finally, trying to find the admin login page and crack the MD5...
Persistent link: https://www.econbiz.de/10008783743
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...