Erscheinungsjahr
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Geheimschrift
Suche ohne Synonyme: keywords:(Geheimschrift)
Verwendete Synonyme:
- cryptography
-
3D Split Manufacturing Approach to Trustworthy System Development
NTIS | 2012|Schlagwörter: Cryptography -
A broadcasting multiple blind signature scheme based on quantum teleportation
Online Contents | 2013|Schlagwörter: Quantum cryptography -
A broadcasting multiple blind signature scheme based on quantum teleportation
Online Contents | 2013|Schlagwörter: Quantum cryptography -
A broadcasting multiple blind signature scheme based on quantum teleportation
Springer Verlag | 2013|Schlagwörter: Quantum cryptography -
Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing
Freier ZugriffGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2014|Schlagwörter: Cryptography -
Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques
Springer Verlag | 2024|Schlagwörter: Cryptography algorithms -
Advancing Cloud Image Security via AES Algorithm Enhancement Techniques
Freier ZugriffDOAJ | 2024|Schlagwörter: cryptography -
Air Force Manual 33-214 Volume 2. Communications and Information. Emission Security Countermeasures Reviews
NTIS | 2001Schlagwörter: Cryptography -
A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
Freier ZugriffDOAJ | 2019|Schlagwörter: cryptography -
Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application
Freier ZugriffBASE | 2021|Schlagwörter: Elliptic Curve Cryptography (ECC), Public Key Cryptography (PKC), Elliptic Curve Cryptography Processor (EECP) -
An essay on the art of decyphering. In which is inserted a discourse of Dr. Wallis. Now first publish'd from his original manuscript in the publick library at Oxford. By John Davys, M. A. Rector of Castle-Ashby in Northamptonshire
NationallizenzTIBKAT | 1737|Schlagwörter: Cryptography -
An Innovative Approach to Cardiovascular Disease Prediction: A Hybrid Deep Learning Model
Freier ZugriffDOAJ | 2023|Schlagwörter: elliptic curve cryptography -
A proxy blind signature scheme based on quantum entanglement
Online Contents | 2013|Schlagwörter: Quantum cryptography -
A proxy blind signature scheme based on quantum entanglement
Online Contents | 2013|Schlagwörter: Quantum cryptography -
A proxy blind signature scheme based on quantum entanglement
Springer Verlag | 2013|Schlagwörter: Quantum cryptography -
Artificial Intelligence and Security in Computing Systems : 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23-25, 2002 Proceedings
TIBKAT | 2003|Schlagwörter: Cryptography. -
A treatise on the art of decyphering : and of writing in cypher. With an harmonic alphabet
NationallizenzTIBKAT | 1772|Schlagwörter: Cryptography -
Benchmarking Framework for Transparent Data Encryption Systems
Freier ZugriffBASE | 2019|Schlagwörter: Cryptography -
Continuous Control of Random Polarization Rotations for Quantum Communications
Online Contents | 2016|Schlagwörter: quantum cryptography -
Conventional Non‐Fluorescent Polymers: Unconventional Security Inks for Data Storage and Multidimensional Photonic Cryptography
Wiley | 2023|Schlagwörter: photonic cryptography -
Cyber Attack Detection with Encrypted Network Connection Analysis
Springer Verlag | 2023|Schlagwörter: Cryptography -
Defense Communications System Applications Engineering Manual. Volume V. Transportable Sets
NTIS | 1968Schlagwörter: Cryptography -
Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks
Springer Verlag | 2023|Schlagwörter: Code-based cryptography, Cryptography -
Development of a New Chaotic Maps Cryptosystem with Quadratic Residue Problem
Freier ZugriffDOAJ | 2022|Schlagwörter: Public key cryptography, quadratic residue, Chaotic maps, cryptosystem. -
DMAV: Enhanced MAV Link Protocol Using Dynamic DNA Coding for Unmanned Aerial Vehicles
Freier ZugriffDOAJ | 2022|Schlagwörter: Mavlink, DNA coding, Lightweight cryptography, UAV’s, Secure communication -
Effectively combined multi-party quantum secret sharing and secure direct communication
Online Contents | 2022|Schlagwörter: Quantum cryptography -
Effectively combined multi-party quantum secret sharing and secure direct communication
Springer Verlag | 2022|Schlagwörter: Quantum cryptography -
Efficient quantum secret sharing based on special multi-dimensional GHZ state
Online Contents | 2018|Schlagwörter: Quantum cryptography -
Efficient quantum secret sharing based on special multi-dimensional GHZ state
Springer Verlag | 2018|Schlagwörter: Quantum cryptography -
Encryption using two-dimensional cellular automata with applications
Springer Verlag | 2003|Schlagwörter: cryptography -
Enhanced multiparty quantum secret sharing protocol based on quantum secure direct communication and corresponding qubits in noisy environment
Online Contents | 2022|Schlagwörter: Quantum cryptography -
Enhanced multiparty quantum secret sharing protocol based on quantum secure direct communication and corresponding qubits in noisy environment
Springer Verlag | 2022|Schlagwörter: Quantum cryptography -
Enhancing Optical-CDMA Confidentiality With Multicode-Keying Encryption
Online Contents | 2015|Schlagwörter: cryptography -
Error probability in polarization sensitive communication systems in terms of moments of the channel’s rotation angle
Freier ZugriffOnline Contents | 2021|Schlagwörter: Quantum cryptography -
Error probability in polarization sensitive communication systems in terms of moments of the channel’s rotation angle
Freier ZugriffSpringer Verlag | 2021|Schlagwörter: Quantum cryptography -
Fast and Clean: Auditable high-performance assembly via constraint solving
Freier ZugriffBASE | 2023|Schlagwörter: Cryptography, Post-Quantum Cryptography -
Fibonacci Multichaos Algorithm for Medical Image Encryption for Transmission Through Wavelet Transform Based OFDM System and Its VLSI Realization
Freier ZugriffDOAJ | 2022|Schlagwörter: cryptography -
Handle the Sybil Attack Using Hash Technique in Vehicular Ad Hoc Networks
Springer Verlag | 2023|Schlagwörter: Cryptography -
Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI
Freier ZugriffDOAJ | 2021|Schlagwörter: robot operating system (ros), humanoid robot, communication, network, wireless, encryption, decryption, cryptography, secure ros -
Intermittent Impulsive Synchronization of Hyperchaos with Application to Secure Communication
Wiley | 2013|Schlagwörter: cryptography -
Intrinsic error vector magnitude on pulsed local oscillator coherent optical receiver measurements
Online Contents | 2015|Schlagwörter: Quantum cryptography -
Intrinsic error vector magnitude on pulsed local oscillator coherent optical receiver measurements
Online Contents | 2015|Schlagwörter: Quantum cryptography
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.