X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (23473) 23473
Book Chapter (12172) 12172
Newspaper Article (10561) 10561
Magazine Article (10001) 10001
Patent (7970) 7970
Conference Proceeding (5167) 5167
Book / eBook (3902) 3902
Trade Publication Article (3025) 3025
Web Resource (1562) 1562
Newsletter (653) 653
Report (536) 536
Dissertation (368) 368
Book Review (334) 334
Government Document (130) 130
Reference (91) 91
Publication (39) 39
Transcript (24) 24
Streaming Video (12) 12
Journal / eJournal (7) 7
Paper (3) 3
Video Recording (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
data encryption (41371) 41371
computer science (24849) 24849
computer security (15529) 15529
computer communication networks (14553) 14553
management of computing and information systems (9464) 9464
network security (8505) 8505
data security (8502) 8502
physics (8484) 8484
data structures, cryptology and information theory (8335) 8335
computing (7984) 7984
counting (7968) 7968
calculating (7959) 7959
algorithm analysis and problem complexity (7784) 7784
coding and information theory (7454) 7454
electric digital data processing (7030) 7030
cryptography (6942) 6942
systems and data security (6438) 6438
algorithms (6071) 6071
encryption (6051) 6051
computer science, theory & methods (5570) 5570
computers and society (5516) 5516
computer science, information systems (5057) 5057
information systems applications (4919) 4919
electricity (4701) 4701
security (4701) 4701
operating systems (4687) 4687
electric communication technique (4620) 4620
internet (4583) 4583
privacy (4579) 4579
discrete mathematics in computer science (4558) 4558
transmission of digital information, e.g. telegraphiccommunication (4342) 4342
cloud computing (4180) 4180
data integrity (3780) 3780
computers (3776) 3776
computer science, general (3377) 3377
analysis (3312) 3312
safety and security measures (3290) 3290
methods (3209) 3209
engineering, electrical & electronic (3183) 3183
legal aspects of computing (3114) 3114
security management (3077) 3077
computer networks (3064) 3064
access control (3058) 3058
software (2868) 2868
telecommunications (2854) 2854
mathematics (2598) 2598
security measures (2486) 2486
information technology (2434) 2434
studies (2428) 2428
computer science, software engineering (2426) 2426
usage (2345) 2345
communications engineering, networks (2263) 2263
management (2235) 2235
research (2140) 2140
data protection (2138) 2138
special purpose and application-based systems (2136) 2136
multimedia information systems (2084) 2084
information systems (2082) 2082
data encryption chips (2054) 2054
computer software industry (1977) 1977
information storage and retrieval (1971) 1971
software engineering (1861) 1861
artificial intelligence (1853) 1853
cryptology (1835) 1835
authentication (1805) 1805
engineering (1804) 1804
product introduction (1804) 1804
computer information security (1766) 1766
protection (1744) 1744
combinatorics (1727) 1727
information and communication, circuits (1695) 1695
verschlüsselung (1612) 1612
mathematics, applied (1600) 1600
computer privacy (1597) 1597
computer systems (1587) 1587
internet crime (1583) 1583
wireless networks (1544) 1544
congresses (1519) 1519
cybersecurity (1507) 1507
data processing (1489) 1489
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (1424) 1424
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (1424) 1424
cyber security (1419) 1419
data mining (1410) 1410
servers (1392) 1392
computer communication systems (1383) 1383
electronic digital computers (1376) 1376
data encoding (1368) 1368
encryption of data (1368) 1368
internet of things (1349) 1349
big data (1341) 1341
computer system security (1302) 1302
protection of computer systems (1301) 1301
security of computer systems (1301) 1301
computer viruses (1273) 1273
database management (1250) 1250
computer software (1203) 1203
laws, regulations and rules (1188) 1188
technology (1144) 1144
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (1547) 1547
Engineering & Comp. Sci. - Stacks (367) 367
UofT at Mississauga - Stacks (134) 134
Collection Dvlpm't (Acquisitions) - Vendor file (114) 114
Gerstein Science - Stacks (94) 94
Robarts - Stacks (85) 85
UTL at Downsview - May be requested (81) 81
UofT at Scarborough - Stacks (65) 65
Collection Dvlpm't (Acquisitions) - Closed Orders (48) 48
Mathematical Sciences - Stacks (32) 32
Faculty of Information - Stacks (20) 20
Law (Bora Laskin) - Stacks (20) 20
St. Michael's College (John M. Kelly) - 2nd Floor (19) 19
Engineering & Comp. Sci. - May be requested in 6-10 wks (12) 12
Engineering & Comp. Sci. - Missing (10) 10
Trinity College (John W Graham) - Stacks (8) 8
Faculty of Information - May be requested in 6-10 wks (5) 5
Engineering & Comp. Sci. - Periodical Stacks (4) 4
Physics - Stacks (4) 4
New College (Ivey) - Stacks (3) 3
Trinity College (John W Graham) - Reference (3) 3
UofT Schools - Stacks (3) 3
UofT at Mississauga - Reference (3) 3
Law (Bora Laskin) - Closed Orders (2) 2
Law (Bora Laskin) - Theses (2) 2
Mathematical Sciences - Missing (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Aerospace - Stacks (1) 1
Business (Joseph L Rotman) - Stacks (1) 1
Engineering & Comp. Sci. - Reference (1) 1
Gerstein Science - Circulation Desk (1) 1
Gerstein Science - Reference (1) 1
Gerstein Science - Theses (1) 1
Media Commons - Audio Visual (1) 1
Media Commons - Microtexts (1) 1
OISE - Curriculum Resources (1) 1
OISE - Stacks (1) 1
Physics - Circulation Desk (1) 1
Providence Healthcare - Stacks (1) 1
Robarts - Gov Pub Storage: Request at Reference Desk 4th floor (1) 1
Robarts - Government Pubs (1) 1
Robarts - Microtexts (1) 1
Robarts - Not Returned (1) 1
Scarborough Hospital - General (1) 1
St. Michael's Hospital - Stacks (1) 1
University College (Laidlaw) - Stacks (1) 1
UofT at Mississauga - Periodical Stacks (1) 1
UofT at Scarborough - May be requested in 6-10 wks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (76679) 76679
German (3507) 3507
Chinese (2056) 2056
French (1618) 1618
Korean (227) 227
Japanese (218) 218
Spanish (116) 116
Russian (84) 84
Portuguese (26) 26
Czech (17) 17
Norwegian (16) 16
Swedish (16) 16
Arabic (6) 6
Hungarian (5) 5
Polish (5) 5
Indonesian (4) 4
Danish (3) 3
Dutch (3) 3
Italian (3) 3
Lithuanian (3) 3
Serbian (3) 3
Turkish (3) 3
Icelandic (2) 2
Ukrainian (2) 2
Croatian (1) 1
Estonian (1) 1
Hebrew (1) 1
Romanian (1) 1
Slovenian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2007, Project hacking kitaab, ISBN 8125922512, x, 284
Book
2011, Lecture Notes in Computer Science, ISBN 3642204643, Volume 6632
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is... 
Systems and Data Security | Discrete Mathematics in Computer Science | Data Encryption | Computer Science | Management of Computing and Information Systems | Computer Communication Networks | Algorithm Analysis and Problem Complexity
Book Chapter
Journal Article
2017, ISBN 0300227442, xiv, 221 pages
.... presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections... 
Data encryption (Computer science) | Computer networks | Law and legislation | Computer security | Security measures | Government policy
Book
2017, ISBN 0691141754, xiv, 373 pages
"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages... 
Ciphers | Mathematics | Cryptography | Computer security | Cryptography -- Mathematics
Book
2005, ISBN 0387201092, x, 291
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper... 
Computer security | Data encryption (Computer science) | General Theory of Computing | Popular Science in Mathematics/Computer Science/Natural Science/Technology | Coding and Information Theory | Computers and Society | Popular Science | Data Encryption
Book
IEEE transactions on computers, ISSN 0018-9340, 2015, Volume 64, Issue 2, pp. 425 - 437
Journal Article
Journal of the ACM (JACM), ISSN 0004-5411, 11/2018, Volume 65, Issue 6, pp. 1 - 37
Journal Article
Optics express, ISSN 1094-4087, 2015, Volume 23, Issue 2, pp. 655 - 666
Journal Article
IEEE transactions on information forensics and security, ISSN 1556-6021, 2013, Volume 8, Issue 8, pp. 1343 - 1354
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes... 
verifiability | outsourced decryption | Public key | Games | Educational institutions | Attribute-based encryption | Encryption | Servers | PAIRINGS | PROTOCOLS | DELEGATION | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Access control | Data encryption | Network security | Cloud computing | Messages | Policies | Computation | Keys | Transformations
Journal Article
2011, Lecture Notes in Computer Science, ISBN 3642204643, Volume 6632
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted input by manipulating only the ciphertexts... 
Systems and Data Security | Discrete Mathematics in Computer Science | Data Encryption | Computer Science | Management of Computing and Information Systems | Computer Communication Networks | Algorithm Analysis and Problem Complexity
Book Chapter