Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 20
- Cryptography 18
- Data and Information Security 16
- Data protection 16
- History of engineering & technology 15
- Computer networking & communications 13
- Cryptology 13
- Data encryption (Computer science) 13
- Coding theory & cryptology 12
- Artificial intelligence 11
- Computer science 11
- Network security 11
- Software Engineering 10
- Computer networks 9
- Information retrieval 9
- Technology: general issues 9
- Applied mathematics 8
- Computer Communication Networks 8
- Mathematics 8
- Network hardware 8
- Legal aspects of IT 6
- Research & information: general 6
- Application software 5
- Computer and Information Systems Applications 5
- Information theory 5
- Mathematical theory of computation 5
- Computer networks 4
- Computing & information technology 4
- Information technology industries 4
- Information technology: general issues 4
-
161
-
162
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields /
Published 2020Table of Contents: “…Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.…”
Link to Metadata
Electronic eBook -
163
-
164
-
165
Cellular Automata Innovative Modelling for Science and Engineering
Published 2011DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
166
-
167
Photon-Counting Image Sensors
Published 2017DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
168
-
169
IMPLEMENTASI ALGORITMA AES DAN BCRYPT UNTUK PENGAMANAN FILE DOKUMEN
Published 2022Link Metadata
Book -
170
-
171
Blockchain and Cryptocurrencies
Published 2021DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
172
-
173
Quantum Computing for the Quantum Curious
Published 2021Table of Contents: “…-- 3 Creating Superposition: The Beam Splitter -- 4 Creating Superposition: Stern-Gerlach -- 5 Quantum Cryptography -- 6 Quantum Gates -- 7 Entanglement -- 8 Quantum Teleportation -- 9 Quantum Algorithms -- 10 Worksheets -- Appendices -- Alphabetical Index -- Acknowledgments -- Answers.…”
Link to Metadata
Electronic eBook -
174
-
175
Security of Ubiquitous Computing Systems Selected Topics /
Published 2021Link to Metadata
Electronic eBook -
176
-
177
-
178
Breaking Japanese Diplomatic Codes David Sissons and D Special Section during the Second World War
Published 2013DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
179
Novel Insights into Orbital Angular Momentum Beams: From Fundamentals, Devices to Applications
Published 2019DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
180
Distributed Ledgers Design and Regulation of Financial Infrastructure and Payment Systems
Published 2020DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter