X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (59322) 59322
Journal Article (31128) 31128
Conference Proceeding (20769) 20769
Magazine Article (9261) 9261
Book Chapter (4092) 4092
Trade Publication Article (3153) 3153
Newsletter (2757) 2757
Book / eBook (2366) 2366
Web Resource (2302) 2302
Dissertation (657) 657
Book Review (344) 344
Government Document (233) 233
Transcript (79) 79
Reference (72) 72
Report (68) 68
Standard (33) 33
Publication (28) 28
Paper (17) 17
Streaming Video (10) 10
Journal / eJournal (7) 7
Video Recording (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
data encryption (82852) 82852
computer security (43640) 43640
encryption (31701) 31701
network security (31275) 31275
computer science (16914) 16914
science & technology (13387) 13387
technology (11480) 11480
cryptography (11424) 11424
algorithms (9443) 9443
security management (8649) 8649
data encryption chips (7769) 7769
cloud computing (7672) 7672
software (7623) 7623
security (7427) 7427
internet (7272) 7272
inventors (6569) 6569
privacy (6515) 6515
internet crime (6243) 6243
engineering (5727) 5727
data integrity (5685) 5685
data security (5545) 5545
coding and information theory (5388) 5388
access control (5261) 5261
data structures, cryptology and information theory (5060) 5060
computer science, information systems (4742) 4742
servers (4467) 4467
information technology (4371) 4371
engineering, electrical & electronic (4346) 4346
product introduction (4261) 4261
physical sciences (4171) 4171
computers (4147) 4147
computer science, theory & methods (4112) 4112
verschlüsselung (3859) 3859
authentication (3718) 3718
computer software industry (3708) 3708
safety and security measures (3661) 3661
computer viruses (3442) 3442
computer communication networks (3335) 3335
mathematics (3319) 3319
security services (3309) 3309
methods (3297) 3297
computer information security (3138) 3138
computer networks (3110) 3110
computer science, general (3070) 3070
telecommunications (2923) 2923
legal aspects of computing (2893) 2893
analysis (2830) 2830
wireless networks (2782) 2782
image encryption (2682) 2682
intellectual property (2642) 2642
public key infrastructure (2597) 2597
protocols (2589) 2589
operating systems (2553) 2553
internet of things (2524) 2524
research (2358) 2358
national security (2329) 2329
identity-based encryption (2276) 2276
usage (2266) 2266
social networks (2230) 2230
public key (2226) 2226
ciphers (2199) 2199
digital signatures (2135) 2135
hackers (2100) 2100
cryptology (2077) 2077
smartphones (2061) 2061
automation (2021) 2021
security measures (2001) 2001
software industry (1997) 1997
customer services (1943) 1943
information systems (1936) 1936
compliance (1917) 1917
homomorphic encryption (1914) 1914
computer science, software engineering (1900) 1900
communication (1888) 1888
electronic commerce (1824) 1824
mathematics, applied (1822) 1822
hardware (1796) 1796
discrete mathematics in computer science (1784) 1784
combinatorics (1724) 1724
infrastructure (1717) 1717
web sites (1712) 1712
laws, regulations and rules (1698) 1698
malware (1685) 1685
computer simulation (1660) 1660
studies (1636) 1636
conferences (1635) 1635
data protection (1622) 1622
information and communication, circuits (1544) 1544
cyberterrorism (1475) 1475
mathematical models (1457) 1457
protection (1454) 1454
sensors (1413) 1413
electronic mail systems (1401) 1401
algorithm design and analysis (1391) 1391
computer systems (1388) 1388
management of computing and information systems (1381) 1381
chaos theory (1379) 1379
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (1427) 1427
Engineering & Comp. Sci. - Stacks (222) 222
UofT at Mississauga - Stacks (82) 82
Robarts - Stacks (65) 65
Gerstein Science - Stacks (61) 61
Collection Dvlpm't (Acquisitions) - Vendor file (60) 60
UTL at Downsview - May be requested (45) 45
UofT at Scarborough - Stacks (39) 39
Collection Dvlpm't (Acquisitions) - Closed Orders (24) 24
Mathematical Sciences - Stacks (22) 22
Law (Bora Laskin) - Stacks (17) 17
St. Michael's College (John M. Kelly) - 2nd Floor (12) 12
Engineering & Comp. Sci. - May be requested in 6-10 wks (11) 11
Faculty of Information - Stacks (8) 8
Trinity College (John W Graham) - Stacks (7) 7
Engineering & Comp. Sci. - Periodical Stacks (4) 4
UofT Schools - Stacks (4) 4
Engineering & Comp. Sci. - Missing (2) 2
Faculty of Information - May be requested in 6-10 wks (2) 2
Law (Bora Laskin) - Closed Orders (2) 2
New College (Ivey) - Stacks (2) 2
UofT at Mississauga - Reference (2) 2
Victoria University E.J. Pratt - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Business (Joseph L Rotman) - Stacks (1) 1
Gerstein Science - Circulation Desk (1) 1
Gerstein Science - Reference (1) 1
Gerstein Science - Theses (1) 1
Media Commons - Audio Visual (1) 1
OISE - Stacks (1) 1
Physics - Stacks (1) 1
Providence Healthcare - Stacks (1) 1
Robarts - Government Pubs (1) 1
Robarts - Not Returned (1) 1
St. Michael's Hospital - Stacks (1) 1
UofT at Mississauga - Periodical Stacks (1) 1
UofT at Scarborough - May be requested in 6-10 wks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (131781) 131781
German (2938) 2938
Chinese (1959) 1959
Japanese (612) 612
Korean (150) 150
Spanish (109) 109
Czech (60) 60
French (46) 46
Portuguese (46) 46
Russian (39) 39
Turkish (18) 18
Arabic (17) 17
Hindi (13) 13
Swedish (12) 12
Indonesian (11) 11
Urdu (8) 8
Croatian (6) 6
Polish (5) 5
Slovak (5) 5
Azerbaijani (4) 4
Hungarian (4) 4
Norwegian (4) 4
Italian (3) 3
Lithuanian (3) 3
Dutch (2) 2
Persian (2) 2
Slovenian (2) 2
Afrikaans (1) 1
Catalan (1) 1
Romanian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2013, ISBN 9781447152293, x, 438
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to... 
Biometric identification | Data encryption (Computer science) | Security measures | Data protection | Privacy, Right of | Computer security
Book
2017, Chapman & Hall/CRC cryptography and network security, ISBN 1498729843, ix, 402 variously numbered pages
Book
Proceedings of the forty-sixth annual ACM symposium on theory of computing, ISSN 0737-8017, 05/2014, pp. 475 - 484
We introduce a new technique, that we call punctured programs , to apply indistinguishability obfuscation towards cryptographic problems. We use this technique... 
encryption | obfuscation | Obfuscation | Encryption
Conference Proceeding
2004, 3rd ed., ISBN 0387406972, xx, 898
This book provides a comprehensive reference for the many different types and methods of compression. It can serve as an encyclopedia of the topic. The 4th... 
Data compression (Computer science) | Coding and Information Theory | Data Storage Representation | Signal, Image and Speech Processing | Cryptology | Computer Science | Image Processing and Computer Vision
Book
Concurrency and computation, ISSN 1532-0626, 10/2017, Volume 29, Issue 20, p. n/a
Summary Key revocation and ciphertext update are two critical issues for identity‐based encryption schemes. Designing an identity‐based encryption scheme with... 
ciphertext update | identity‐based encryption | revocable identity‐based encryption | cloud computing | key revocation | proxy re‐encryption | identity-based encryption | proxy re-encryption | revocable identity-based encryption | Cloud computing | Public Key Infrastructure | Encryption | Data encryption | Cryptography
Journal Article
2007, 4th rev. and extended ed., ISBN 9783540245025, xii, 524 p., [16] p. of plates
The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and... 
Computer security | Cryptology | Cryptography | Coding and Information Theory | Computers and Society | Number Theory | Applications of Mathematics | Computer Science
Book
ACM Computing Surveys (CSUR), ISSN 0360-0300, 09/2018, Volume 51, Issue 4, pp. 1 - 35
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses... 
FHE implementation | FHE | Fully homomorphic encryption | homomorphic encryption | partially homomorphic encryption | SWHE | FHE survey | somewhat homomorphic encryption | PHE | Homomorphic encryption | Partially homomorphic encryption | Somewhat homomorphic encryption | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology
Journal Article
2010, ISBN 0387277110, xiii, 192
This is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. The book provides... 
Computer security | Digital signatures | Business communication | Electronic commerce | Computer Systems Organization and Communication Networks | Computer Science | Coding and Information Theory | Communications Engineering, Networks | Cryptology | Computer Communication Networks | Data Structures and Information Theory
Book
2014, Expert's voice in information security, ISBN 1430263822, xxvii, 361 pages
Book
2017, ISBN 0300227442, xiv, 221 pages
"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your... 
Data encryption (Computer science) | Computer networks | Law and legislation | Computer security | Security measures | Government policy
Book
2012, ISBN 0262017512, 276
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots,... 
Electronic evidence | Law and legislation | Data encryption (Computer science) | Computing and Processing | Technology | Information Theory | Security | Cryptography | COMPUTERS | Data encryption (Computer science) - Law and legislation
Book
Nonlinear dynamics, ISSN 1573-269X, 08/2016, Volume 87, Issue 1, pp. 127 - 133
Journal Article
2015, Advances in information security, ISBN 9783319251318, Volume 63., xv, 251 pages
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational,... 
Computer security | Data protection | Data encryption (Computer scienc | Systems and Data Security | Information Systems Applications (incl. Internet) | Cryptology | Computer Science | Deception | Cyber intelligence (Computer security) | Security measures | Cyberspace
Book
Multimedia tools and applications, ISSN 1380-7501, 05/2020, Volume 79, Issue 17-18, pp. 11615 - 11615
In the original publication, figure 2 has some incorrect notations and Table 1 has inappropriate alignment. The original article has been corrected. 
Encryption
Journal Article
2006, ISBN 0521864852, Volume 9780521864855, xiii, 261
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure... 
Cryptography | Data encryption (Computer science)
Book
Frontiers of Computer Science, ISSN 2095-2228, 04/2021, Volume 15, Issue 2
Journal Article
2013, 1. Aufl., ISBN 1461453070, Volume 9781493917402, xiii, 235
Book