Auswahl der wissenschaftlichen Literatur zum Thema „Decryption“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Decryption" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Decryption"

1

Partala, Juha. "Symmetric Blind Decryption with Perfect Secrecy." Journal of Computer Networks and Communications 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6575907.

Der volle Inhalt der Quelle
Annotation:
A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plain-text message. Such schemes are useful, for example, for the implementation of privacy-preserving encrypted file storages and payment systems. In terms of functionality, blind decryption is close to oblivious transfer. For noiseless channels, information-theoretically secure oblivious transfer is impossible. However, in this paper, we show that this is not the case for blind decryption. We formulate a definition of perfect secrecy of symmetric blind decryption for
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zheng, Ting, and Zhi Zhong Zhang. "A Method Based on Hash Table to Implement the NAS Layer Decryption in LTE Big Data Platform." Applied Mechanics and Materials 716-717 (December 2014): 1430–33. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.1430.

Der volle Inhalt der Quelle
Annotation:
Firstly, this paper introduces the overall framework and design ideas of LTE big data platform. Secondly, it describes the principles of decrypting encrypted data. In view of the distribution characters of keys required by NAS layer decryption, a decryption scheme for analysis and implementation based on the data structure of hash bucket is proposed. Finally, this scheme is validated and analyzed. Aiming to studying decryption scheme of NAS date, applying this scheme to analyze the LTE big data platform and implementing the function of encrypt the NAS PDU in LTE big data platform. The scheme h
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Brygilevych, Volodymyr, Nazar Pelypets, and Vasyl Rabyk. "Encryption of text messages using multilayer neural networks." Computational Problems of Electrical Engineering 10, no. 2 (2020): 1–6. http://dx.doi.org/10.23939/jcpee2020.02.001.

Der volle Inhalt der Quelle
Annotation:
The article considers an algorithm for encrypting / decrypting text messages using multilayer neural networks (MLNN). The algorithm involves three steps: training a neural network based on the training pairs formed from a basic set of characters found in the text; encryption of the message using the weight coefficients of the hidden layers; its decryption using the weight coefficients of the output layer. The conditions necessary for successful encryption / decryption with this algorithm are formed, its limitations are emphasized. The MLNN architecture and training algorithm are described. The
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.

Der volle Inhalt der Quelle
Annotation:
Uncloneable encryption, first introduced by Broadbent and Lord (TQC 2020) is a quantum encryption scheme in which a quantum ciphertext cannot be distributed between two non-communicating parties such that, given access to the decryption key, both parties cannot learn the underlying plaintext. In this work, we introduce a variant of uncloneable encryption in which several possible decryption keys can decrypt a particular encryption, and the security requirement is that two parties who receive independently generated decryption keys cannot both learn the underlying ciphertext. We show that this
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Popescu, Narcis I., Cristina Lupu, and Florea Lupu. "Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity." Blood 116, no. 21 (2010): 1131. http://dx.doi.org/10.1182/blood.v116.21.1131.1131.

Der volle Inhalt der Quelle
Annotation:
Abstract Abstract 1131 Cell exposed tissue factor (TF), the physiologic initiator of blood coagulation, is normally expressed in a low procoagulant, or cryptic conformation, and requires activation, or decryption, to fully exhibit its procoagulant potential. TF decryption is not fully understood and multiple decrypting mechanisms have been proposed including phosphatidylserine (PS) exposure, TF monomerization, association with lipid rafts and redox modulation of TF. Calcium ionophores have been extensively used as TF decrypting agents, and both PS-dependent and independent mechanisms have been
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Liang, Hangyu. "The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)." Transactions on Social Science, Education and Humanities Research 12 (August 29, 2024): 346–54. http://dx.doi.org/10.62051/1ny8bm98.

Der volle Inhalt der Quelle
Annotation:
In the early years of World War II, German Navy used Enigma to encode messages and prevent their intelligence by Allies. This work considers advantages of stealing and technically decrypting the German Naval Enigma key during the Battle of Atlantic from 1940-41; while Allies had already succeeded in decrypting the German Army Enigma prior to the war. The complexities of Naval Enigma introduced new challenges. Yet British codebreakers persisted with technological decryption — an approach they adopted following their earlier successes. However, details embedded within Naval Enigma plus changes i
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Safitri, Sukmawati Indah, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA)." Jurnal Riset Mahasiswa Matematika 2, no. 6 (2023): 214–20. http://dx.doi.org/10.18860/jrmm.v2i6.22017.

Der volle Inhalt der Quelle
Annotation:
Classical and modern cryptography have advantages and disadvantages in securing text messages. Hybrid algorithms can combine two algorithms to produce a higher level of message security when compared to one type of algorithm. This study discusses a hybrid algorithm that combines Myszkowski Cipher and RSA. The purpose of this research is to obtain ciphertext that is more difficult to crack by cryptanalysis. The hybrid algorithm process is done by encrypting text messages with the Myszkowski Cipher algorithm then the key used in the Myszkowski Cipher algorithm are encrypted using the RSA algorit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Patil, Vedika, Sakshi Jain, and Yogita Shah. "Secure Cryptography by Using Hash Application." Journal of Cyber Security in Computer System 1, no. 1 (2022): 18–24. http://dx.doi.org/10.46610/jcscs.2022.v01i01.002.

Der volle Inhalt der Quelle
Annotation:
This project is basically design for ensuring security to all kinds of data format file such as pdf, text, images, audio, videos etc. This is carried out using various keys and hashing algorithm. This project basically helps the end user to protect his/her personal files from the unauthorized user and can also restrict its access to the limited people. This complete process is carried out in two methods that are encryption and decryption. Encryption process required varchar key while encryption the data file which convert the original file in to incomprehensible format. Further in decryption p
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Irwanto, Dola. "File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 670–77. http://dx.doi.org/10.57152/malcom.v4i2.1305.

Der volle Inhalt der Quelle
Annotation:
Digital data security has become very important in the current information era. One way to maintain data security is to use encryption and decryption techniques. The Advanced Encryption Standard (AES) algorithm has been proven effective in protecting data with a high level of security. This research aims to implement the AES-128 bit algorithm for online file encryption and decryption via a website. The method used in this research includes developing a website that provides a user interface for uploading and encrypting files, as well as for decrypting files that have been previously encrypted.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Liu, Bao Long, Hua Chen, and Yi Guo. "Encrypted XML Data Query Processing with Range Query." Applied Mechanics and Materials 65 (June 2011): 241–45. http://dx.doi.org/10.4028/www.scientific.net/amm.65.241.

Der volle Inhalt der Quelle
Annotation:
Without decrypting the encrypted blocks, it is difficult to query encrypted XML data. Inspired by Query-Aware decryption scheme, the paper extends the scheme to support range query with value index. Value index is based on order preserving encryption. The testing results indicate that the proposed scheme can complete a correct query processing, and support range query.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Decryption"

1

Strand, Martin. "Verifiable Shuffled Decryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21427.

Der volle Inhalt der Quelle
Annotation:
We describe the Verifiable Shuffled Decryption problem, and present five solutions based on adapting several existing verifiable shuffles. All but one may have potential for implementation, the choice of which would depend on the required level of security and computational restrictions given by the available hardware.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Burman, Annie. "Gendering decryption - decrypting gender : The gender discourse of labour at Bletchley Park 1939-1945." Thesis, Uppsala universitet, Historiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-201046.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Takagi, Tsuyoshi. "New public-key cryptosystems with fast decryption." Phd thesis, [S.l. : s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962729302.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Käck, Emil. "TLS Decryption in passive monitoring system with server private key." Thesis, Umeå universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-184490.

Der volle Inhalt der Quelle
Annotation:
Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. Modern networks encrypt data when sending it between nodes that makes passive monitoring more complex. A prevalent encryption mechanism on an IP-based network is TLS that needs to be decrypted.                This article’s purpose is to check if it is possible to decrypt TLS traffic in a passive monitoring system with the ser
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Merz, Doug, and Bruce Maples. "Encrypt/Decrypt COMSEC Unit for Space-based Command and Telemetry Applications." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605565.

Der volle Inhalt der Quelle
Annotation:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>This paper describes the system-level architecture and design concept of a communications security (COMSEC) equipment intended for space-based low data rate (< 1 Mbps) command and telemetry applications. The COMSEC Unit is a stand-alone piece of equipment which provides decryption of uplink command and control information and encryption of downlink telemetry data. The system-level architecture is described followed by an overview of the digital design concepts
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Loban, H. "A VHDL Implemetation of the Advanced Encryption Standard." Thesis, NURE, MC&FPGA, 2019. https://mcfpga.nure.ua/conf/2019-mcfpga/10-35598-mcfpga-2019-014.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Greinsmark, Carl. "Ransomware." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20695.

Der volle Inhalt der Quelle
Annotation:
This thesis researches different ransomwares, how we can stop them and how their threat vectors work. It is important to notice that when solving one ransomware doesn’t solve the next incoming one. In this thesis we investigate six different ransomwares that spread between 2016-2019. We investigate the encryption methods, the different threat vectors, infection spreading and how to prevent from them by doing a theoretical and practical study. The results show that after infection of a ransomware, it encrypts the data instantaneously on the system. Fortunately, to keep information safe there ar
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Samuel, David. "RFID security in door locks." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.

Der volle Inhalt der Quelle
Annotation:
<p>Radio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.</p><p>MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are con
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Manteena, Rajender. "A VHDL Implemetation of the Advanced Encryption Standard-Rijndael Algorithm." Scholar Commons, 2004. https://scholarcommons.usf.edu/etd/1149.

Der volle Inhalt der Quelle
Annotation:
The National Institute of Standards and Technology (NIST) has initiated a process to develop a Federal information Processing Standard (FIPS) for the Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. The Advanced Encryption Standard can be programmed in software or built with pure hardware. However Field Programmable Gate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Bücher zum Thema "Decryption"

1

Martínez-Guerra, Rafael, Juan Javier Montesinos-García, and Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Paulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung / = The Phaistos disk : an approach to its decryption. 2nd ed. Verlag Dr. Kovac, 2017.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Paulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung = The Phaistos disk : an approach to its decryption. Kovac, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Decryption. KJB Writing Services, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Decryption. KJB Writing Services, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Beardsley, Ian. Et Decryption. Lulu Press, Inc., 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Marks, Philip. Decryption Engine. Independently Published, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Countdown to Decryption. Pandamoon Publishing, 2024.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Muniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Decryption of Indus Scripts. Internet, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Decryption"

1

Weik, Martin H. "decryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4547.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_400.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Mu, Yi, Vijay Varadharajan, and Khan Quac Nguyen. "Delegated Decryption." In Cryptography and Coding. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46665-7_30.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kaliski, Burt. "Decryption Exponent." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_400.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ryan, Mark D. "Making Decryption Accountable." In Security Protocols XXV. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71075-4_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Green, Matthew. "Secure Blind Decryption." In Public Key Cryptography – PKC 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19379-8_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Hassan, Nihad A. "Ransomware Decryption Tools." In Ransomware Revealed. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4255-1_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Kävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kävrestad, Joakim. "Decryption and Password Enforcing." In Fundamentals of Digital Forensics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ohta, Kazuo. "Remarks on blind decryption." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030413.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Decryption"

1

Mishra, Shreshtha, Ojusav Agarwal, and Sunil Kumar Patel. "Quantum Decryption using Shor’s Algorithm." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895777.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Shah, Aaryak, Alok Kumar Kamal, and Neeraj. "Steganographic Encryption and Decryption Using Duality Preserving GANs." In 2024 IEEE 22nd International Conference on Industrial Informatics (INDIN). IEEE, 2024. https://doi.org/10.1109/indin58382.2024.10774348.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kuppan, Ajith Kumar, Raviraj Bhat, and Uday Trivedi. "QUIC SNI decryption usefulness prediction using Machine Learning." In 2024 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2024. http://dx.doi.org/10.1109/conecct62155.2024.10677263.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

V, Thanikaiselvan, Abilash P, Lingeswar C, et al. "Chaotic Audio Encryption and Decryption Using Logistic Map." In 2024 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS). IEEE, 2024. http://dx.doi.org/10.1109/i2cacis61270.2024.10649629.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Amano, Hodaka, Keiji Shimada, Reika Suketomo, Ryosuke Matsumoto, and Takahiro Kodama. "Impact of AES-CTR Mode Modified QAM Symbol Block Cipher on Nonlinear Fiber-Optic Channels." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.2.

Der volle Inhalt der Quelle
Annotation:
In a 7-ch WDM transmission experiment spanning 2240 km with fiber nonlinearity effects, we employed AES-CTR mode corrected symbol block cipher for dual-polarized-QAM, showcasing penalty-free performance irrespective of encryption presence and rendering eavesdropper decryption challenging.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Matsumoto, Ryosuke, and Takahiro Kodama. "High-Speed Quantum Noise Stream Cipher System Enabled by Optical Fiber-based Encryption and Low-Complexity Digital Decryption." In CLEO: Science and Innovations. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_si.2024.sth3q.1.

Der volle Inhalt der Quelle
Annotation:
We propose secure digital-coherent system utilizing high-speed encryption/decryption through fiber and simplified digital back propagation (DBP). Negligible penalty is observed by detecting 64-Gbaud 216-level PSK-like chipper signals through a 5-stage DBP with precise fiber parameters.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zivic, Natasa, Esad Kadusic, and Mirko Skrbic. "Mathematical optimization of decrypting algorithm for soft input decryption." In 2009 XXII International Symposium on Information, Communication and Automation Technologies (ICAT 2009). IEEE, 2009. http://dx.doi.org/10.1109/icat.2009.5348411.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Müller, Jens, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, and Jörg Schwenk. "Practical Decryption exFiltration." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019. http://dx.doi.org/10.1145/3319535.3354214.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kalaichelvi, V., and R. M. Chandrasekaran. "FSPAlgorithm for encryption/decryption." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787779.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Gahi, Youssef, Farid Bourennani, Mouhcine Guennoun, and Hussein T. Mouftah. "Blind decryption for cloud computing." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543875.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Decryption"

1

Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada581720.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Dolmatov, V., ed. GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5830.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Fedoseev, O. N. Calculation of the coverage area based on GOOGLE EARTH satellite images (MAP PIXEL-decryption V1.1 ). Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2024. http://dx.doi.org/10.12731/ofernio.2023.25277.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Everett, Martin. EU–US collaboration on quantum technologies. Royal Institute of International Affairs, 2021. http://dx.doi.org/10.55317/9781784134211.

Der volle Inhalt der Quelle
Annotation:
The development of quantum technologies represents a significant scientific advance with the potential to benefit many. However, security concerns over quantum technologies in the fields of computing and communications – chiefly in relation to encryption and decryption – have limited international cooperation. Existing discussions between the EU and US on quantum technologies remain low key. However, closer partnerships in the sector are possible in basic scientific research and communications standards. In order to remain a relevant player in the advancement of quantum technology, EU-based re
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

von Luckner, Clemens Graf, Carmen Reinhart, and Kenneth Rogoff. Decrypting New Age International Capital Flows. National Bureau of Economic Research, 2021. http://dx.doi.org/10.3386/w29337.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!