Current Search:  Data protection (x)

View All Items

  • CSV Spreadsheet
(1 - 8 of 8)
Microprocessor design for non-discretionary multilevel security
Data protection and management solutions to desktop clients: Integration with enterprise tools
Cryptography in the presence of key-dependent messages
APPLICATION OF BLOCKCHAIN NETWORK FOR THE USE OF INFORMATION SHARING
Adaptive two-level watermarking for binary document images
SELECTED APPLICATIONS OF MPC
Password-authenticated two-party key exchange with long-term security
Machine learning algorithms for the analysis and detection of network attacks