Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- image encryption 8 Treffer
- cloud computing 5 Treffer
- public-key cryptography 5 Treffer
- algorithms 4 Treffer
- big data 4 Treffer
-
41 weitere Werte:
- cloud storage 4 Treffer
- contracting out 4 Treffer
- cryptography 4 Treffer
- fully homomorphic encryption 4 Treffer
- gsw 4 Treffer
- municipal services 4 Treffer
- polynomial rings 4 Treffer
- problem solving 4 Treffer
- trust 4 Treffer
- lwe 3 Treffer
- ntru 3 Treffer
- artificial intelligence 2 Treffer
- computer security 2 Treffer
- fully homomorphic encryption (fhe) 2 Treffer
- 02 engineering and technology 1 Treffer
- 0202 electrical engineering, electronic engineering, information engineering 1 Treffer
- 020201 artificial intelligence & image processing 1 Treffer
- 020206 networking & telecommunications 1 Treffer
- business 1 Treffer
- business.industry 1 Treffer
- computer 1 Treffer
- computer networks and communications 1 Treffer
- computer science 1 Treffer
- computer.software_genre 1 Treffer
- fhe 1 Treffer
- gdpr 1 Treffer
- general engineering 1 Treffer
- hardness 1 Treffer
- hardware and architecture 1 Treffer
- homomorphic encryption 1 Treffer
- lattice 1 Treffer
- learning with errors (lwe) 1 Treffer
- less-than 1 Treffer
- privacy 1 Treffer
- privacy preservation 1 Treffer
- public-key cryptosystem 1 Treffer
- safety, risk, reliability and quality 1 Treffer
- sensitive data 1 Treffer
- software 1 Treffer
- statistics and probability 1 Treffer
- vector 1 Treffer
Publikation
Sprache
9 Treffer
-
In: Journal of Intelligent & Fuzzy Systems, Jg. 43 (2022-12-01), Heft 6, S. 8417-8437Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 29 (2021-03-01), Heft 2, S. 135-160Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 29 (2021-03-01), Heft 2, S. 135-160Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 29 (2021-03-01), Heft 2, S. 135-160Online academicJournalZugriff:
-
In: Studies in Health Technology & Informatics, Jg. 302 (2023-01-15), S. 267-271academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 29 (2021-03-01), Heft 2, S. 135-160Online academicJournalZugriff:
-
In: Journal of Intelligent & Fuzzy Systems, Jg. 43 (2022-11-11), S. 8417-8437Online unknownZugriff:
-
In: Journal of Computer Security, Jg. 29 (2021-03-29), S. 135-160Online unknownZugriff: