Filters
Moderm methods for improving security of personal computers, part 1: Hard drive encryption
Basic themes of document: security; encryption; harddrive encryption; software encryption; hardware encryption...
IN - Informatika
- 2011 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Techniques of homomorphic encryption and their practical usage
The paper deals with the analysis and overview of the current state of cryptographic primitives which allows homomorphic encryption. The properties of homomorphic encryption and their possibility of achieving a fully homomorphic
JA - Elektronika a optoelektronika, elektrotechnika
- 2014 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
A Survey of Methods for Encrypted Traffic Classification and Analysis
With the widespread use of encrypted data transport network traffic encryption and analysis of encrypted traffic. First, we describe the most widespread encryption protocols used throughout the Internet. We show th...
IN - Informatika
- 2015 •
- Jx •
- Link
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Výsledek na webu
Exact and approximate encryption of quantum information
Analysis of approximative encryption of quantum information.
IN - Informatika
- 2005 •
- C
Rok uplatnění
C - Kapitola v odborné knize
Aperiodic Encryption for Digital Data
The patent brings a new method of data encryption using quasicrystals.
IN - Informatika
- 2004 •
- P
Rok uplatnění
P - Patent
Cryptographic convertor
Cryptographic Converter is an application for encryption / decryption implemented as a TCP server / client, which serves as an encryption convertor on the data concentrator side or collection point. The encryption convertor...
JA - Elektronika a optoelektronika, elektrotechnika
- 2011 •
- R •
- Link
Rok uplatnění
R - Software
Výsledek na webu
Source Mage GNU/Linux and On-The-Fly Encryption
On-the-fly encryption (OTFE), also known as Real-time Encryption, is a method used by some encryption programs, for example, disk encryption software. "On-the-fly" refers to the fact that the files are accessible i...
IN - Informatika
- 2011 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
The Impact of IPSec Encryption on the Voice Quality
The work focuses on impacts of the encryption of calls on the delay of packets resulting in security gateways.
IN - Informatika
- 2014 •
- D
Rok uplatnění
D - Stať ve sborníku
Encryption of Messages and Images Using Compressed Sensing
The article deals with compressed sensing used to encrypt data. It allows performing signal capturing, its compression and encryption at the same time. The measurement matrix is generated using a secret key and is exploited for ...
JA - Elektronika a optoelektronika, elektrotechnika
- 2015 •
- D
Rok uplatnění
D - Stať ve sborníku
Extending Full Disk Encryption for the Future
Full Disk Encryption (FDE) provides confidentiality of a data-at-rest stored on persistent devices like disk or solid state drives (SSD). Typical examples of widely used followers or any self-encrypted drives (SED). Our goal is to s...
Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
- 2017 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
- 1 - 10 out of 619