Searched for: "data encryption techniques"
- Security (753)
- Cloud (166)
- Data Management (99)
- Mobility (65)
- Networking (63)
- Big Data (52)
- Hardware (36)
- Software (25)
- Microsoft (24)
- Developer (19)
- Enterprise Software (18)
- Storage (16)
- Data Centers (12)
- Cxo (10)
- After Hours (5)
- Open Source (5)
- Project Management (5)
- Virtualization (5)
- Collaboration (4)
- Banking (3)
- Innovation (2)
- Tech & Work (2)
- Apple (1)
- E-Commerce (1)
- Printers (1)
- Social Enterprise (1)
About 1398 results for "data encryption techniques"
The growth rate of the internet exceeds day-by-day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a maj...
Optimized Reserving Room Approach for Reversible Data Hiding Algorithm Before Encryption on Encrypted Digital Images
Reversible data hiding is the technique in which data in the cover image reversibly can retrieve after the extraction of hidden data in it. The technique provides the secrecy for a...
Comparison of Privacy Preserving Single-Keyword Search and Multi-Keyword Ranked Search Techniques Over Encrypted Cloud Data
Cloud computing otherwise known as on demand computing. It provides the services over the internet. It has the provision of facilitating users to store and access their data in and...
One very important challenges of today's cloud storage services are that the management of the ever-increasing amount of data. To create data management scalable, de-duplication ha...
Attribute-Based sEcret writing (ABE) could be a normal secret writing that enables users to write and rewrite information supported user attributes. ABE is a secret writing theme e...
Visual Cryptography (VC) is a special kind of encryption techniques which is applied to hide the data in images. The image can be decrypted by using correct key image. Visual crypt...
Inside Microsoft's latest operating system are a number of significant features that business users need to understand.
The Tor network is similar to a door lock: It works well, until a determined individual wants to get in. Get details on what Tor is and what it is not.
Security is one of the major concerns of all the users irrespective of the domain in which they work. There are various ways by which one can ensure the security for the data which...
Cryptography is a technique used to keep the message secret. Now-a-days, one of the major challenges is transfer of data securely through the secure communication channel. Symmetri...