Year of publication
Type of media
Subject
Type of material
Language
1–17 of 17 hits
Sort by:
Sort by:
-
Deciphering papal ciphers from the 16th to the 18th Century
Free accessTaylor & Francis Verlag | 2021|Keywords: DECRYPT project -
Keys with nomenclatures in the early modern Europe
Free accessTaylor & Francis Verlag | 2024|Keywords: DECRYPT project -
Aplikasi Enkripsi dan Dekripsi Short Message Service di Android Menggunakan Metode Blowfish
Free accessBASE | 2020|Keywords: Decrypt -
Sistem Informasi Encrypt Dan Decrypt Dengan Algoritma AES Menggunakan Framework Laravel
Free accessDOAJ | 2020|Keywords: encrypt dan decrypt -
The Research and Implementation of SM2 Algorithm on COS
National licenceTrans Tech Publications | 2013|Keywords: Decrypt -
Implementation and Use of Base64 Algorithm in Video File Security
Free accessDOAJ | 2022|Keywords: security, base64, encrypt, decrypt, ascii -
Aplikasi Enkripsi dan Dekripsi Short Message Service di Android Menggunakan Metode Blowfish
Free accessDOAJ | 2020|Keywords: decrypt -
Encryption and Decryption of Secure Data for Diverse Genomes
Springer Verlag | 2022|Keywords: GCM decrypt -
A Searchable Re-encryption Storage Method in Cloud Environment
Free accessDOAJ | 2018|Keywords: Decrypt -
Providing Data Security in Deep Learning by Using Genomic Procedure
Springer Verlag | 2020|Keywords: Encrypt and decrypt -
Design of High Security and Performance System for Storage Devices Using AES
Springer Verlag | 2012|Keywords: Encrypt/decrypt -
Cybersecurity Attacks: Analysis of “WannaCry” Attack and Proposing Methods for Reducing or Preventing Such Attacks in Future
Springer Verlag | 2020|Keywords: Decrypt -
A Robust Graphical Authentication System for the Shoulder Surfing Attack
Springer Verlag | 2023|Keywords: Decrypt -
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices
Springer Verlag | 2015|Keywords: Decrypt-then-mask protocol -
Personal Network Security
Wiley | 2010|Keywords: secure unicast communication ‐ session keys to encrypt and decrypt packets -
340 mV-1.1 V, 289 Gbps/W, 2090-Gate NanoAES Hardware Accelerator With Area-Optimized Encrypt/Decrypt GF(2 4 ) 2 Polynomials in 22 nm Tri-Gate CMOS
Online Contents | 2015|Keywords: area-optimized encrypt-decrypt GF(2 4 ) 2 polynomial
- ««
- «
- 1
- »»
Hits per page
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.