Page 1 from 81 hits

Sort by: Relevancy | Currentness | Title

External sources

Searching...

Synonyms were used for: Datensicherheit

Search without synonyms: keywords:(Datensicherheit)

Used synonyms:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    Duomenų apsaugos metodai CD/DVD laikmenoms ; Security methods for CD/DVD media

    Raižys, Artūras | BASE | 2011
    Keywords: data security methods, data security
  2.  

    Evaluation of Data Integrity Methods in Storage: Oracle Database

    Posse, Oliver / Tomanović, Ognjen | BASE | 2015
    Keywords: Data Integrity
  3.  

    Modified Blowfish Algorithm

    Quilala, Rogel Ladia / Sison, Ariel M / Medina, Ruji P | BASE | 2018
    Keywords: Hash; data integrity; security; cryptography; avalanche
  4.  

    PRIVACY PRESERVING SEARCH OVER ENCRYPTED DATA OF MULTIPLE DATA OWNER

    Prasad Deshpande, / SachinWalunj. | BASE | 2015
    Keywords: Cloud Data Security
  5.  

    Next-generation big data analytics: state of the art, challenges, and future research topics

    Lv, Zhihan / Song, Houbing / Basanta Val, Pablo et al. | BASE | 2017
    Keywords: Security of data
  6.  

    Role of Biometric security for The Enhancement of Data Security

    Gupta, Himanshu / Chauhan, Kapil | BASE | 2015
    Keywords: Data Security, Voice Recognition; Security of Data; Fingerprint Recognition
  7.  

    Rolling Boles, Optimal XML Structure Integrity for Updating Operations

    Graf, Sebastian / Belle, Sebastian / Waldvogel, Marcel | BASE | 2011
    Keywords: XML data integrity
  8.  

    A COMPARATIVE STUDY OF THE SECRET SHARING ALGORITHMS FOR SECURE DATA IN THE CLOUD

    S.Jaya Nirmala 1 , S.Mary Saira Bhanu 1 , Ahtesham Akhtar Patel 2 | BASE | 2018
    Keywords: Data Security
  9.  

    Importance of Mobile Security

    Priyanshi Gupta / Latika Kharb | BASE | 2019
    Keywords: data security
  10.  

    Audio Steganography Using Two LSB Modification and RSA For Security Data Transmission

    Harjito, Bambang / Sulistyarso, Beni / Suryani, Esti | BASE | 2018
    Keywords: Data Security
  11.  

    Implementation of message authentication code using DNA-LCG key and a novel hash algorithm

    Sodhi, Gurpreet Kour / Gaba, Gurjot Singh / Kansal, Lavish et al. | BASE | 2019
    Keywords: data integrity; hash; linear congruential generator; message authentication code; message digest; security
  12.  

    ASPECT-BASE PROXY-ORIENTED INFORMATION SAVING AND DISTANT DATA RELIABILITY VERIFICATION IN CLOUD

    Manthena, Prudhvi Raju / Sangeetha, A. | BASE | 2017
    Keywords: Proxy Public Key Cryptography; Remote Data Integrity Checking; Cloud Computing; Identity-Based Cryptography;
  13.  

    REMOTE DATA RELIABILITY CHECKING IN SUPPORTABLE DATA CONTROL IN MULTI CLOUD STORAGE

    Soundarya, E. / Sarma, K.S.R.K. | BASE | 2017
    Keywords: Proxy Public Key Cryptography; Remote Data Integrity Checking; Cloud Computing; Identity-Based Cryptography;
  14.  

    ECHOING QUALITIES OF REDUCED HINDRANCE AND ELEVATED VERACITY ON SAME CHANNEL

    Deepak Naidu, A. Vikranth / Venkatadri, N | BASE | 2016
    Keywords: Wireless Sensor Networks; Data Integrity; Delay Differentiated Services; Dynamic Routing; And Potential Field
  15.  

    Data in Transit Validation for Cloud Computing Using Cloud-Based Algorithm Detection of Injected Objects

    Funke Olanrewaju, Rashidah / Islam, Thouhedul / O. Khalifa, Othman et al. | BASE | 2018
    Keywords: Data Security
  16.  

    Sufficient condition for ephemeral key-leakage resilient tripartite key exchange

    Fujioka, Atsushi / Manulis, Mark / Suzuki, Koutarou et al. | BASE | 2012
    Keywords: Security of data
  17.  

    Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud

    Bhargavi Patel | BASE | 2019
    Keywords: Data Security
  18.  

    Multimaster hybrid model for field programmable gated array-system on chip devices

    Lnu, Kamran Khader | BASE | 2017
    Keywords: Electrical engineering; Systems on a chip -- design and construction; Data integrity; Embedded computer systems -- Design and construction
  19.  

    A RELIABLE DATA OUTSOURCING WITH REVOCABLE REPOSITORY IDENTITY-BASED CONVERSION IN CLOUD COMPUTING

    Sowmya, Lochar / Shankar, Thalla | BASE | 2018
    Keywords: Proxy Public Key Cryptography; Remote Data Integrity Checking; Cloud Computing; Identity-Based Cryptography; Access Control; Cloud Computing;

Number of results: 10 | 20 | 50