X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (47189) 47189
Journal Article (34704) 34704
Conference Proceeding (26860) 26860
Book Chapter (12928) 12928
Trade Publication Article (9323) 9323
Magazine Article (9051) 9051
Newsletter (3221) 3221
Web Resource (2836) 2836
Publication (2772) 2772
Book / eBook (2311) 2311
Dissertation (649) 649
Book Review (481) 481
Government Document (233) 233
Report (122) 122
Reference (87) 87
Transcript (86) 86
Paper (60) 60
Standard (30) 30
Data Set (10) 10
Streaming Video (4) 4
Journal / eJournal (2) 2
Technical Report (2) 2
Video Recording (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
data encryption (88122) 88122
computer security (40376) 40376
encryption (28964) 28964
network security (28831) 28831
computer science (22374) 22374
computer communication networks (12945) 12945
cryptography (11026) 11026
management of computing and information systems (9220) 9220
algorithms (8841) 8841
security management (7993) 7993
security (7777) 7777
data encryption chips (7595) 7595
algorithm analysis and problem complexity (7593) 7593
coding and information theory (7359) 7359
internet (7207) 7207
data structures, cryptology and information theory (7043) 7043
cloud computing (6797) 6797
software (6615) 6615
inventors (6120) 6120
privacy (5993) 5993
systems and data security (5848) 5848
computer science, theory & methods (5527) 5527
computers and society (5343) 5343
data security (5287) 5287
data integrity (5241) 5241
internet crime (5211) 5211
computer science, information systems (5154) 5154
operating systems (4978) 4978
access control (4889) 4889
patents (4575) 4575
discrete mathematics in computer science (4424) 4424
engineering, electrical & electronic (4377) 4377
product introduction (4341) 4341
information systems applications (4232) 4232
servers (4052) 4052
information technology (4031) 4031
authentication (3863) 3863
computers (3843) 3843
computer software industry (3672) 3672
computer viruses (3473) 3473
verschlüsselung (3472) 3472
safety and security measures (3464) 3464
methods (3250) 3250
computer information security (3200) 3200
analysis (3165) 3165
computer science, general (3088) 3088
legal aspects of computing (3072) 3072
security services (2796) 2796
mathematics (2773) 2773
computer networks (2764) 2764
image encryption (2749) 2749
telecommunications (2697) 2697
standards (2683) 2683
wireless networks (2582) 2582
identity-based encryption (2570) 2570
protocols (2520) 2520
intellectual property (2470) 2470
research (2350) 2350
usage (2309) 2309
public key infrastructure (2305) 2305
images (2297) 2297
public key (2109) 2109
social networks (2006) 2006
national security (1997) 1997
software industry (1988) 1988
ciphers (1986) 1986
computer science, software engineering (1984) 1984
digital signatures (1974) 1974
mathematics, applied (1948) 1948
smartphones (1939) 1939
information systems (1901) 1901
studies (1836) 1836
electronic commerce (1827) 1827
security measures (1792) 1792
communications engineering, networks (1790) 1790
combinatorics (1785) 1785
electronic books (1782) 1782
compliance (1768) 1768
hackers (1765) 1765
internet of things (1752) 1752
communication (1738) 1738
laws, regulations and rules (1718) 1718
hardware (1686) 1686
optics (1661) 1661
cryptology (1657) 1657
customer services (1610) 1610
mathematical models (1586) 1586
conferences (1561) 1561
data protection (1555) 1555
information and communication, circuits (1555) 1555
computer science, hardware & architecture (1552) 1552
web sites (1549) 1549
special purpose and application-based systems (1505) 1505
computer simulation (1504) 1504
software engineering (1502) 1502
automation (1465) 1465
information storage and retrieval (1440) 1440
multimedia information systems (1427) 1427
algorithm design and analysis (1421) 1421
protection (1391) 1391
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (1423) 1423
Engineering & Comp. Sci. - Stacks (216) 216
UofT at Mississauga - Stacks (77) 77
Gerstein Science - Stacks (60) 60
Robarts - Stacks (58) 58
Collection Dvlpm't (Acquisitions) - Vendor file (56) 56
UTL at Downsview - May be requested (42) 42
UofT at Scarborough - Stacks (36) 36
Collection Dvlpm't (Acquisitions) - Closed Orders (23) 23
Mathematical Sciences - Stacks (20) 20
Law (Bora Laskin) - Stacks (17) 17
Engineering & Comp. Sci. - May be requested in 6-10 wks (11) 11
St. Michael's College (John M. Kelly) - 2nd Floor (11) 11
Faculty of Information - Stacks (9) 9
Trinity College (John W Graham) - Stacks (6) 6
UofT Schools - Stacks (4) 4
Engineering & Comp. Sci. - Missing (2) 2
Engineering & Comp. Sci. - Periodical Stacks (2) 2
Faculty of Information - May be requested in 6-10 wks (2) 2
Law (Bora Laskin) - Closed Orders (2) 2
New College (Ivey) - Stacks (2) 2
UofT at Mississauga - Reference (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Business (Joseph L Rotman) - Stacks (1) 1
Gerstein Science - Circulation Desk (1) 1
Gerstein Science - Reference (1) 1
Gerstein Science - Theses (1) 1
Media Commons - Audio Visual (1) 1
OISE - Stacks (1) 1
Physics - Stacks (1) 1
Providence Healthcare - Stacks (1) 1
Robarts - Government Pubs (1) 1
Robarts - Not Returned (1) 1
St. Michael's Hospital - Stacks (1) 1
UofT at Scarborough - May be requested in 6-10 wks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (131389) 131389
German (2872) 2872
Chinese (2071) 2071
Japanese (511) 511
Korean (125) 125
Spanish (93) 93
Portuguese (31) 31
French (23) 23
Russian (18) 18
Turkish (16) 16
Indonesian (14) 14
Hindi (12) 12
Czech (8) 8
Urdu (7) 7
Lithuanian (6) 6
Arabic (4) 4
Croatian (4) 4
Polish (4) 4
Azerbaijani (2) 2
Dutch (2) 2
Persian (2) 2
Slovenian (2) 2
Swedish (2) 2
Catalan (1) 1
Italian (1) 1
Norwegian (1) 1
Romanian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


by Kong, D and Shen, X and Xu, Q and Xin, W and Guo, H
Applied Optics, ISSN 1559-128X, 04/2013, Volume 52, Issue 12, pp. 2619 - 2625
A multiple-image encryption scheme based on cascaded fractional Fourier transform is proposed. In the scheme, images are successively coded into the amplitude... 
Encryption
Journal Article
by Ren, Y and Wang, S and Zhang, X
Computers & Mathematics with Applications, ISSN 0898-1221, 05/2013, Volume 65, Issue 9
Parallel key-insulated encryption (PKIE) usually allows two independent helper keys to be alternately used in temporary secret key update operations. At least... 
Encryption
Journal Article
Journal of the National Institute of Information and Communications Technology, ISSN 1349-3205, 03/2017, Volume 63, Issue 2, p. 215
In this paper, we introduce a secure storage system named “PRINCESS” and an application, the PRINCESS-based automobile information sharing system that are... 
Encryption
Journal Article
2017, Chapman & Hall/CRC cryptography and network security, ISBN 1498729843, ix, 402 variously numbered pages
Book
Information Sciences, ISSN 0020-0255, 08/2014, Volume 275, pp. 370 - 384
Journal Article
2013, 2013, ISBN 9781447152293, x, 438
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to... 
Biometric identification | Data encryption (Computer science) | Security measures | Data protection | Biometrics | Legal Aspects of Computing | Computer Appl. in Social and Behavioral Sciences | Data Encryption | Computer Science | User Interfaces and Human Computer Interaction | Privacy, Right of | Computer security
Book
2012, ISBN 0262017512, 276
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots,... 
Electronic evidence | Law and legislation | Data encryption (Computer science) | Computing and Processing | Technology | Data encryption (Computer science) - Law and legislation
Book
Theoretical Computer Science, ISSN 0304-3975, 03/2017, Volume 667, pp. 51 - 92
Journal Article
Proceedings of the forty-sixth annual ACM symposium on theory of computing, ISSN 0737-8017, 05/2014, pp. 475 - 484
We introduce a new technique, that we call punctured programs , to apply indistinguishability obfuscation towards cryptographic problems. We use this technique... 
encryption | obfuscation | Obfuscation | Encryption
Conference Proceeding
IEEE Transactions on Information Theory, ISSN 0018-9448, 10/2016, Volume 62, Issue 10, pp. 5709 - 5726
Journal Article
2007, Updated and expanded ed., ISBN 9780262042406, xvii, 472
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been... 
Data encryption (Computer science) | Electronic surveillance | Privacy, Right of | Law and legislation | United States | Telecommunication | Political aspects | Electronic intelligence | Wiretapping | General Theory of Computing | Engineering Profession | Telecommunication - Political aspects - United States
Book
2010, ISBN 0262015307, xvi, 383
Digital communications are the lifeblood of modern society. We "meet up" online, tweet our reactions millions of times a day, connect through social networking... 
Data encryption (Computer science) | Electronic surveillance | Risk assessment | Telecommunication | Computer crimes | Security measures | Government policy | Political aspects | Wiretapping | Law | United States | Technology
Book
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 10/2017, Volume 29, Issue 20, p. n/a
Key revocation and ciphertext update are two critical issues for identity‐based encryption schemes. Designing an identity‐based encryption scheme with key... 
ciphertext update | identity‐based encryption | revocable identity‐based encryption | cloud computing | key revocation | proxy re‐encryption | identity-based encryption | proxy re-encryption | revocable identity-based encryption | Cloud computing | Public Key Infrastructure | Encryption | Data encryption | Cryptography
Journal Article
2013 IEEE Global Communications Conference (GLOBECOM), ISSN 1930-529X, 12/2013, pp. 689 - 694
Data sharing in the cloud, fueled by favorable cloud technology trends, has emerging as a promising pattern in regard to enabling data more accessible to users... 
Encryption
Conference Proceeding
Sensors (Switzerland), ISSN 1424-8220, 06/2017, Volume 17, Issue 6, p. 1423
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.