All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

629 (0,08s)

Result

Message Embedded Synchronization for the Generalized Lorenz System and Its Use for Chaotic Masking

. Furthermore, using the resulting synchronization, the novel secure encryption scheme is proposed. It requires very reasonable amount of data to encrypt and time to decrypt one bit. Basically, to encrypt one bit, only one ...

BC - Teorie a systémy řízení

  • 2013
  • D
  • Link
Result

Financial Securies' Reporting and IFRS 7 Requirements: from Czech Perspective

Basic themes of document: financial instruments; CR; IFRS...

AE - Řízení, správa a administrativa

  • 2008
  • Jx
Result

Technical Aspects of Information War

Participants presented prposals and solutions in the field of information operations; information war and security of information systems.

KA - Vojenství

  • 2002
  • M
Result

Moderm methods for improving security of personal computers, part 1: Hard drive encryption

Basic themes of document: security; encryption; harddrive encryption; software encryption; hardware encryption...

IN - Informatika

  • 2011
  • Jx
Result

Techniques of homomorphic encryption and their practical usage

The paper deals with the analysis and overview of the current state of cryptographic primitives which allows homomorphic encryption. The properties of homomorphic encryption and their possibility of achieving a fully homomorphic

JA - Elektronika a optoelektronika, elektrotechnika

  • 2014
  • Jx
Result

A Survey of Methods for Encrypted Traffic Classification and Analysis

With the widespread use of encrypted data transport network traffic encryption and analysis of encrypted traffic. First, we describe the most widespread encryption protocols used throughout the Internet. We show th...

IN - Informatika

  • 2015
  • Jx
  • Link
Result

Exact and approximate encryption of quantum information

Analysis of approximative encryption of quantum information.

IN - Informatika

  • 2005
  • C
Result

Aperiodic Encryption for Digital Data

The patent brings a new method of data encryption using quasicrystals.

IN - Informatika

  • 2004
  • P
Result

Cryptographic convertor

Cryptographic Converter is an application for encryption / decryption implemented as a TCP server / client, which serves as an encryption convertor on the data concentrator side or collection point. The encryption convertor...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2011
  • R
  • Link
Result

Source Mage GNU/Linux and On-The-Fly Encryption

On-the-fly encryption (OTFE), also known as Real-time Encryption, is a method used by some encryption programs, for example, disk encryption software. "On-the-fly" refers to the fact that the files are accessible i...

IN - Informatika

  • 2011
  • D
  • Link
  • 1 - 10 out of 629