Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Decryption“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Decryption" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Decryption"
Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.
Der volle Inhalt der QuelleZheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.
Der volle Inhalt der QuelleBrygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.
Der volle Inhalt der QuelleKundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.
Der volle Inhalt der QuellePopescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.
Der volle Inhalt der QuelleLiang, Hangyu. "The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 346–54. http://dx.doi.org/10.62051/1ny8bm98.
Der volle Inhalt der QuelleSafitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.
Der volle Inhalt der QuellePatil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.
Der volle Inhalt der QuelleIrwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.
Der volle Inhalt der QuelleLiu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.
Der volle Inhalt der QuelleDissertationen zum Thema "Decryption"
Strand, Martin. "Verifiable Shuffled Decryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.
Der volle Inhalt der QuelleBurman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945." Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.
Der volle Inhalt der QuelleTakagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.
Der volle Inhalt der QuelleKäck, Emil. "TLS Decryption in passive monitoring system with server private key." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.
Der volle Inhalt der QuelleMerz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.
Der volle Inhalt der QuelleLoban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.
Der volle Inhalt der QuelleGreinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.
Der volle Inhalt der QuelleSamuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.
Der volle Inhalt der QuelleManteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.
Der volle Inhalt der QuelleKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Der volle Inhalt der QuelleBücher zum Thema "Decryption"
Martínez-Guerra, Rafael, Juan Javier Montesinos-García, and Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.
Der volle Inhalt der QuellePaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung / = The Phaistos disk : an approach to its decryption. 2nd ed. Verlag Dr. Kovac, 2017.
Den vollen Inhalt der Quelle findenPaulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung = The Phaistos disk : an approach to its decryption. Kovac, 2014.
Den vollen Inhalt der Quelle findenMarks, Philip. Decryption Engine. Independently Published, 2016.
Den vollen Inhalt der Quelle findenMuniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.
Der volle Inhalt der QuelleBuchteile zum Thema "Decryption"
Weik, Martin H. "decryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4547.
Der volle Inhalt der QuelleKaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_400.
Der volle Inhalt der QuelleMu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.
Der volle Inhalt der QuelleKaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_400.
Der volle Inhalt der QuelleRyan, Mark D. "Making Decryption Accountable." In Security Protocols XXV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_11.
Der volle Inhalt der QuelleGreen, Matthew. "Secure Blind Decryption." In Public Key Cryptography – PKC 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19379-8_16.
Der volle Inhalt der QuelleHassan, Nihad A. "Ransomware Decryption Tools." In Ransomware Revealed. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4255-1_8.
Der volle Inhalt der QuelleKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_5.
Der volle Inhalt der QuelleKävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_5.
Der volle Inhalt der QuelleOhta, Kazuo. "Remarks on blind decryption." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030413.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Decryption"
Mishra, Shreshtha, Ojusav Agarwal, and Sunil Kumar Patel. "Quantum Decryption using Shor’s Algorithm." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895777.
Der volle Inhalt der QuelleShah, Aaryak, Alok Kumar Kamal, and Neeraj. "Steganographic Encryption and Decryption Using Duality Preserving GANs." In 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN). IEEE, 2024. https://doi.org/10.1109/indin58382.2024.10774348.
Der volle Inhalt der QuelleKuppan, Ajith Kumar, Raviraj Bhat, and Uday Trivedi. "QUIC SNI decryption usefulness prediction using Machine Learning." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677263.
Der volle Inhalt der QuelleV, Thanikaiselvan, Abilash P, Lingeswar C, et al. "Chaotic Audio Encryption and Decryption Using Logistic Map." In 2024 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS). IEEE, 2024. http://dx.doi.org/10.1109/i2cacis61270.2024.10649629.
Der volle Inhalt der QuelleAmano, Hodaka, Keiji Shimada, Reika Suketomo, Ryosuke Matsumoto, and Takahiro Kodama. "Impact of AES-CTR Mode Modified QAM Symbol Block Cipher on Nonlinear Fiber-Optic Channels." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.2.
Der volle Inhalt der QuelleMatsumoto, Ryosuke, and Takahiro Kodama. "High-Speed Quantum Noise Stream Cipher System Enabled by Optical Fiber-based Encryption and Low-Complexity Digital Decryption." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.1.
Der volle Inhalt der QuelleZivic, Natasa, Esad Kadusic, and Mirko Skrbic. "Mathematical optimization of decrypting algorithm for soft input decryption." In 2009 XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009). IEEE, 2009. http://dx.doi.org/10.1109/icat.2009.5348411.
Der volle Inhalt der QuelleMüller, Jens, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, and Jörg Schwenk. "Practical Decryption exFiltration." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3354214.
Der volle Inhalt der QuelleKalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.
Der volle Inhalt der QuelleGahi, Youssef, Farid Bourennani, Mouhcine Guennoun, and Hussein T. Mouftah. "Blind decryption for cloud computing." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543875.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Decryption"
Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada581720.
Der volle Inhalt der QuelleDolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5830.
Der volle Inhalt der QuelleFedoseev, O. N. Calculation of the coverage area based on GOOGLE EARTH satellite images (MAP PIXEL-decryption V1.1 ). Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2024. http://dx.doi.org/10.12731/ofernio.2023.25277.
Der volle Inhalt der QuelleEverett, Martin. EU–US collaboration on quantum technologies. Royal Institute of International Affairs, 2021. http://dx.doi.org/10.55317/9781784134211.
Der volle Inhalt der Quellevon Luckner, Clemens Graf, Carmen Reinhart, and Kenneth Rogoff. Decrypting New Age International Capital Flows. National Bureau of Economic Research, 2021. http://dx.doi.org/10.3386/w29337.
Der volle Inhalt der Quelle