skip to main content
Resultados 1 2 3 4 5 next page
Refinado por: assunto: Computer Security remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
Material Type:
Livro
Adicionar ao Meu Espaço

Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers

Peyrin, Thomas Peyrin, Thomas ; Peyrin, Thomas

Berlin, Heidelberg: Springer Nature 2016

Texto completo disponível

2
Selected areas in cryptography 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings
Material Type:
Livro
Adicionar ao Meu Espaço

Selected areas in cryptography 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings

SAC'98 (1998 Kingston, Ont.) Stafford Tavares 1940-; Henk Meijer 1952-

Berlin Springer New York c1999

Localização: ICMC - Inst. Ciên. Mat. Computação    (68-02 LNCS v.1556 ) e outros locais(Acessar)

3
Revocable Attribute-Based Encryption With Data Integrity in Clouds
Material Type:
Artigo
Adicionar ao Meu Espaço

Revocable Attribute-Based Encryption With Data Integrity in Clouds

Ge, Chunpeng ; Susilo, Willy ; Baek, Joonsang ; Liu, Zhe ; Xia, Jinyue ; Fang, Liming

IEEE transactions on dependable and secure computing, 2022-09, Vol.19 (5), p.2864-2872

Washington: IEEE

Texto completo disponível

4
Selected areas in cryptography 6th annual international workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999 : proceedings
Material Type:
Livro
Adicionar ao Meu Espaço

Selected areas in cryptography 6th annual international workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999 : proceedings

SAC'99 (1999 Kingston, Ont.) Howard Heys 1963-; Carlisle Adams 1961-

Berlin Springer-Verlag New York c2000

Localização: ICMC - Inst. Ciên. Mat. Computação    (68-02 LNCS v.1758 e.1 ) e outros locais(Acessar)

5
Public key cryptography second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings
Material Type:
Livro
Adicionar ao Meu Espaço

Public key cryptography second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings

International Workshop on Practice and Theory in Public Key Cryptography (2nd 1999 Kamakura, Japan) Hideki Imai 1943-; Yuliang Zheng 1962-

Berlin Springer New York c1999

Localização: ICMC - Inst. Ciên. Mat. Computação    (68-02 LNCS v.1560 )(Acessar)

6
Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption

Li, Hongfei ; Li, Chuandong ; Ouyang, Deqiang ; Nguang, Sing Kiong

IEEE transaction on neural networks and learning systems, 2021-04, Vol.32 (4), p.1460-1473

United States: IEEE

Texto completo disponível

7
Identity-Based Encryption
Material Type:
Livro
Adicionar ao Meu Espaço

Identity-Based Encryption

Sarkar, Palash ; Chatterjee, Sanjit

New York, NY: Springer Science + Business Media 2011

Texto completo disponível

8
Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications
Material Type:
Artigo
Adicionar ao Meu Espaço

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

Thakur, Sriti ; Singh, Amit Kumar ; Ghrera, Satya Prakash ; Elhoseny, Mohamed

Multimedia tools and applications, 2019-02, Vol.78 (3), p.3457-3470 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

9
Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram
Material Type:
Artigo
Adicionar ao Meu Espaço

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram

Yu, Chuying ; Li, Jianzhong ; Li, Xuan ; Ren, Xuechang ; Gupta, B. B.

Multimedia tools and applications, 2018-02, Vol.77 (4), p.4585-4608 [Periódico revisado por pares]

New York: Springer US

Texto completo disponível

10
An improved attribute‐based encryption technique towards the data security in cloud computing
Material Type:
Artigo
Adicionar ao Meu Espaço

An improved attribute‐based encryption technique towards the data security in cloud computing

Namasudra, Suyel

Concurrency and computation, 2019-02, Vol.31 (3), p.n/a [Periódico revisado por pares]

Hoboken: Wiley Subscription Services, Inc

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (11.819)
  2. Book Chapters  (3.479)
  3. magazinearticle  (2.667)
  4. Livros  (1.159)
  5. Newsletter Articles  (410)
  6. Anais de Congresso  (303)
  7. Artigos de Jornal  (185)
  8. Resenhas  (153)
  9. Reports  (5)
  10. Dissertações  (3)
  11. Recursos Textuais  (1)
  12. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de1985  (32)
  2. 1985Até1993  (240)
  3. 1994Até2002  (2.260)
  4. 2003Até2012  (4.010)
  5. Após 2012  (14.305)
  6. Mais opções open sub menu

Idioma 

  1. Inglês  (20.156)
  2. Japonês  (302)
  3. Alemão  (23)
  4. Espanhol  (11)
  5. Português  (9)
  6. Chinês  (9)
  7. Francês  (8)
  8. Russo  (3)
  9. Polonês  (3)
  10. Catalão  (2)
  11. Eslovaco  (1)
  12. Húngaro  (1)
  13. Norueguês  (1)
  14. Italiano  (1)
  15. Turco  (1)
  16. Romeno  (1)
  17. Ucraniano  (1)
  18. Búlgaro  (1)
  19. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.