All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

619 (0,127s)

Result

Moderm methods for improving security of personal computers, part 1: Hard drive encryption

Basic themes of document: security; encryption; harddrive encryption; software encryption; hardware encryption...

IN - Informatika

  • 2011
  • Jx
Result

Techniques of homomorphic encryption and their practical usage

The paper deals with the analysis and overview of the current state of cryptographic primitives which allows homomorphic encryption. The properties of homomorphic encryption and their possibility of achieving a fully homomorphic

JA - Elektronika a optoelektronika, elektrotechnika

  • 2014
  • Jx
Result

A Survey of Methods for Encrypted Traffic Classification and Analysis

With the widespread use of encrypted data transport network traffic encryption and analysis of encrypted traffic. First, we describe the most widespread encryption protocols used throughout the Internet. We show th...

IN - Informatika

  • 2015
  • Jx
  • Link
Result

Exact and approximate encryption of quantum information

Analysis of approximative encryption of quantum information.

IN - Informatika

  • 2005
  • C
Result

Aperiodic Encryption for Digital Data

The patent brings a new method of data encryption using quasicrystals.

IN - Informatika

  • 2004
  • P
Result

Cryptographic convertor

Cryptographic Converter is an application for encryption / decryption implemented as a TCP server / client, which serves as an encryption convertor on the data concentrator side or collection point. The encryption convertor...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2011
  • R
  • Link
Result

Source Mage GNU/Linux and On-The-Fly Encryption

On-the-fly encryption (OTFE), also known as Real-time Encryption, is a method used by some encryption programs, for example, disk encryption software. "On-the-fly" refers to the fact that the files are accessible i...

IN - Informatika

  • 2011
  • D
  • Link
Result

The Impact of IPSec Encryption on the Voice Quality

The work focuses on impacts of the encryption of calls on the delay of packets resulting in security gateways.

IN - Informatika

  • 2014
  • D
Result

Encryption of Messages and Images Using Compressed Sensing

The article deals with compressed sensing used to encrypt data. It allows performing signal capturing, its compression and encryption at the same time. The measurement matrix is generated using a secret key and is exploited for ...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2015
  • D
Result

Extending Full Disk Encryption for the Future

Full Disk Encryption (FDE) provides confidentiality of a data-at-rest stored on persistent devices like disk or solid state drives (SSD). Typical examples of widely used followers or any self-encrypted drives (SED). Our goal is to s...

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2017
  • D
  • Link
  • 1 - 10 out of 619