UofT Libraries is getting a new library services platform in January 2021.
Learn more about the change.

Search Articles

X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (82463) 82463
Patent (50216) 50216
Journal Article (30231) 30231
Magazine Article (14042) 14042
Conference Proceeding (8557) 8557
Newsletter (5540) 5540
Trade Publication Article (4531) 4531
Book / eBook (3908) 3908
Book Chapter (3313) 3313
Web Resource (2671) 2671
Report (1266) 1266
Dissertation (464) 464
Book Review (388) 388
Government Document (288) 288
Transcript (195) 195
Reference (155) 155
Publication (45) 45
Streaming Video (17) 17
Paper (16) 16
Standard (10) 10
Journal / eJournal (7) 7
Pamphlet (1) 1
Video Recording (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
data encryption (84015) 84015
physics (51135) 51135
computing (50156) 50156
counting (50144) 50144
calculating (50127) 50127
computer security (47712) 47712
electric digital data processing (41459) 41459
network security (33908) 33908
electricity (31149) 31149
electric communication technique (30729) 30729
transmission of digital information, e.g. telegraphiccommunication (28090) 28090
data security (22451) 22451
computer science (18500) 18500
data integrity (16735) 16735
science & technology (14638) 14638
cryptography (14126) 14126
technology (12939) 12939
software (12025) 12025
security management (11336) 11336
internet (10826) 10826
encryption (9706) 9706
privacy (9367) 9367
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (9250) 9250
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (9250) 9250
cloud computing (8777) 8777
inventors (8210) 8210
safety and security measures (7919) 7919
algorithms (7899) 7899
data encryption chips (7782) 7782
information technology (7740) 7740
internet crime (7456) 7456
methods (6599) 6599
computers (6474) 6474
access control (6391) 6391
computer software industry (6106) 6106
data structures, cryptology and information theory (6089) 6089
engineering (6034) 6034
product introduction (6020) 6020
computer science, information systems (5691) 5691
security (5531) 5531
handling record carriers (5365) 5365
presentation of data (5365) 5365
recognition of data (5365) 5365
record carriers (5365) 5365
coding and information theory (5358) 5358
education (5256) 5256
advertising (4908) 4908
pictorial communication, e.g. television (4908) 4908
seals (4700) 4700
display (4697) 4697
computer communication networks (4643) 4643
computer science, theory & methods (4633) 4633
coding or ciphering apparatus for cryptographic or otherpurposes involving the need for secrecy (4437) 4437
computer networks (4294) 4294
analysis (4228) 4228
computer viruses (3955) 3955
engineering, electrical & electronic (3934) 3934
security services (3916) 3916
servers (3915) 3915
intellectual property (3883) 3883
wireless networks (3825) 3825
research (3805) 3805
information storage (3762) 3762
laws, regulations and rules (3675) 3675
usage (3661) 3661
stock exchanges (3548) 3548
social networks (3524) 3524
compliance (3477) 3477
internet of things (3369) 3369
computer science, general (3333) 3333
automation (3319) 3319
telecommunications (3313) 3313
checking-devices (3268) 3268
cyberterrorism (3209) 3209
customer services (3201) 3201
physical sciences (3180) 3180
mathematics (3151) 3151
data processing (3108) 3108
management (3096) 3096
studies (3079) 3079
operating systems (3070) 3070
wireless communications networks (3018) 3018
national security (2985) 2985
earnings per share (2960) 2960
legal aspects of computing (2913) 2913
communication (2912) 2912
big data (2843) 2843
software industry (2817) 2817
information systems (2715) 2715
smartphones (2707) 2707
computer science, software engineering (2696) 2696
public key infrastructure (2626) 2626
electronic commerce (2588) 2588
web sites (2564) 2564
infrastructure (2547) 2547
security measures (2499) 2499
present value (2486) 2486
malware (2478) 2478
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (1556) 1556
Engineering & Comp. Sci. - Stacks (373) 373
UofT at Mississauga - Stacks (140) 140
Collection Dvlpm't (Acquisitions) - Vendor file (122) 122
Robarts - Stacks (96) 96
Gerstein Science - Stacks (95) 95
UTL at Downsview - May be requested (87) 87
UofT at Scarborough - Stacks (69) 69
Collection Dvlpm't (Acquisitions) - Closed Orders (52) 52
Law (Bora Laskin) - Stacks (35) 35
Mathematical Sciences - Stacks (32) 32
Faculty of Information - Stacks (22) 22
St. Michael's College (John M. Kelly) - 2nd Floor (17) 17
Engineering & Comp. Sci. - May be requested in 6-10 wks (12) 12
Engineering & Comp. Sci. - Missing (9) 9
Trinity College (John W Graham) - Stacks (9) 9
Faculty of Information - May be requested in 6-10 wks (5) 5
Engineering & Comp. Sci. - Periodical Stacks (4) 4
Physics - Stacks (4) 4
UofT Schools - Stacks (4) 4
Trinity College (John W Graham) - Reference (3) 3
UofT at Mississauga - Reference (3) 3
Law (Bora Laskin) - Closed Orders (2) 2
Law (Bora Laskin) - Theses (2) 2
Mathematical Sciences - Missing (2) 2
New College (Ivey) - Stacks (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Aerospace - Stacks (1) 1
Baycrest Hospital - Resident/Client Library (1) 1
Business (Joseph L Rotman) - Stacks (1) 1
Engineering & Comp. Sci. - Reference (1) 1
Gerstein Science - Circulation Desk (1) 1
Gerstein Science - Reference (1) 1
Gerstein Science - Theses (1) 1
Mathematical Sciences - Circulation Desk (1) 1
Media Commons - Audio Visual (1) 1
Media Commons - Microtexts (1) 1
OISE - Curriculum Resources (1) 1
OISE - Stacks (1) 1
Physics - Circulation Desk (1) 1
Providence Healthcare - Stacks (1) 1
Robarts - Gov Pub Storage: Request at Reference Desk 4th floor (1) 1
Robarts - Government Pubs (1) 1
Robarts - Microtexts (1) 1
Robarts - Not Returned (1) 1
Scarborough Hospital - General (1) 1
St. Michael's Hospital - Stacks (1) 1
Sunnybrook Health Sciences Centre - Sunnybrook Stacks (1) 1
UofT at Mississauga - Periodical Stacks (1) 1
UofT at Scarborough - May be requested in 6-10 wks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (202306) 202306
Chinese (13593) 13593
French (9151) 9151
German (7196) 7196
Korean (2324) 2324
Japanese (1788) 1788
Spanish (397) 397
Russian (269) 269
Portuguese (159) 159
Norwegian (62) 62
Swedish (44) 44
Czech (36) 36
Danish (29) 29
Polish (23) 23
Hungarian (19) 19
Italian (17) 17
Turkish (17) 17
Dutch (14) 14
Arabic (13) 13
Hindi (13) 13
Finnish (12) 12
Romanian (10) 10
Ukrainian (9) 9
Urdu (9) 9
Hebrew (8) 8
Indonesian (6) 6
Serbian (6) 6
Croatian (5) 5
Slovenian (5) 5
Azerbaijani (4) 4
Bulgarian (4) 4
Icelandic (4) 4
Lithuanian (4) 4
Estonian (3) 3
Greek (2) 2
Slovak (2) 2
Catalan (1) 1
Persian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2007, Project hacking kitaab, ISBN 8125922512, x, 284
Book
2017, ISBN 0691141754, xiv, 373 pages
"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how... 
Ciphers | Mathematics | Cryptography | Computer security | Cryptography -- Mathematics
Book
Journal Article
IEEE transactions on information forensics and security, ISSN 1556-6021, 08/2013, Volume 8, Issue 8, pp. 1343 - 1354
Journal Article
2019, Academic Video Online: Premium, 1 online resource (39 minutes)
... be managed and mitigated. This video begins with a short introduction to certificates and some of the different types of encryption they enable you as a SQL Server... 
Data encryption (Computer science) | SQL (Computer program language) | Instructional films
Streaming Video
Optics express, ISSN 1094-4087, 01/2015, Volume 23, Issue 2, pp. 655 - 666
Journal Article
Nonlinear dynamics, ISSN 1573-269X, 08/2016, Volume 87, Issue 1, pp. 127 - 133
Image encryption has been an attractive research field in recent years. The chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques... 
Engineering | Vibration, Dynamical Systems, Control | Image encryption | Chaotic cryptography | Classical Mechanics | Chaotic tent map | Automotive Engineering | Mechanical Engineering | Mechanics | Technology | Engineering, Mechanical | Science & Technology | Computer science | Investment analysis | Data encryption chips | Algorithms | Cryptography | Analysis | Encryption | Data encryption | Security | Images | Nonlinear dynamics | Chaos theory | Dynamical systems | Streams
Journal Article
IEEE transactions on information theory, ISSN 1557-9654, 05/2018, Volume 64, Issue 5, pp. 3927 - 3943
Journal Article
by Lin, S and Zhang, R and Ma, H and Wang, M
IEEE transactions on information forensics and security, ISSN 1556-6013, 10/2015, Volume 10, Issue 10, pp. 2119 - 2130
Attribute-based encryption (ABE) is a promising technique for fine-grained access control of encrypted data in a cloud storage, however, decryption involved in the ABEs is usually too expensive for resource-constrained front-end... 
Access control | verifiability | Computational modeling | outsourced decryption | Transforms | Attribute-based encryption | Encryption | Outsourcing | access control | Engineering, Electrical & Electronic | Engineering | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology | Data encryption | Network security | Encapsulation | Costs | Computation | Data storage | Bandwidth | Cryptography | Construction costs
Journal Article
Journal Article