Filters
Message Embedded Synchronization for the Generalized Lorenz System and Its Use for Chaotic Masking
. Furthermore, using the resulting synchronization, the novel secure encryption scheme is proposed. It requires very reasonable amount of data to encrypt and time to decrypt one bit. Basically, to encrypt one bit, only one ...
BC - Teorie a systémy řízení
- 2013 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Financial Securies' Reporting and IFRS 7 Requirements: from Czech Perspective
Basic themes of document: financial instruments; CR; IFRS...
AE - Řízení, správa a administrativa
- 2008 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Technical Aspects of Information War
Participants presented prposals and solutions in the field of information operations; information war and security of information systems.
KA - Vojenství
- 2002 •
- M
Rok uplatnění
M - Uspořádání konference
Moderm methods for improving security of personal computers, part 1: Hard drive encryption
Basic themes of document: security; encryption; harddrive encryption; software encryption; hardware encryption...
IN - Informatika
- 2011 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Techniques of homomorphic encryption and their practical usage
The paper deals with the analysis and overview of the current state of cryptographic primitives which allows homomorphic encryption. The properties of homomorphic encryption and their possibility of achieving a fully homomorphic
JA - Elektronika a optoelektronika, elektrotechnika
- 2014 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
A Survey of Methods for Encrypted Traffic Classification and Analysis
With the widespread use of encrypted data transport network traffic encryption and analysis of encrypted traffic. First, we describe the most widespread encryption protocols used throughout the Internet. We show th...
IN - Informatika
- 2015 •
- Jx •
- Link
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Výsledek na webu
Exact and approximate encryption of quantum information
Analysis of approximative encryption of quantum information.
IN - Informatika
- 2005 •
- C
Rok uplatnění
C - Kapitola v odborné knize
Aperiodic Encryption for Digital Data
The patent brings a new method of data encryption using quasicrystals.
IN - Informatika
- 2004 •
- P
Rok uplatnění
P - Patent
Cryptographic convertor
Cryptographic Converter is an application for encryption / decryption implemented as a TCP server / client, which serves as an encryption convertor on the data concentrator side or collection point. The encryption convertor...
JA - Elektronika a optoelektronika, elektrotechnika
- 2011 •
- R •
- Link
Rok uplatnění
R - Software
Výsledek na webu
Source Mage GNU/Linux and On-The-Fly Encryption
On-the-fly encryption (OTFE), also known as Real-time Encryption, is a method used by some encryption programs, for example, disk encryption software. "On-the-fly" refers to the fact that the files are accessible i...
IN - Informatika
- 2011 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
- 1 - 10 out of 629