Searched for: "encryption methods for protecting data"
- Security (121)
- Networking (30)
- Cloud (21)
- Microsoft (15)
- Mobility (14)
- Data Management (10)
- Developer (8)
- Big Data (7)
- Hardware (6)
- Software (6)
- Storage (5)
- Apple (4)
- Banking (4)
- Cxo (4)
- Data Centers (4)
- Collaboration (3)
- Open Source (3)
- Project Management (2)
- Android (1)
- Enterprise Software (1)
- Google (1)
- Smbs (1)
- Social Enterprise (1)
- Virtualization (1)
About 273 results for "encryption methods for protecting data"
DataGravity leverages storage arrays for data loss prevention. Keith Townsend points out that tech is just one aspect of a data center security solution.
If you've been looking for the easiest way to encrypt your mobile email, Jack Wallen has the solution with K-9 Mail and AGP.
In present years, there has been momentous progress in multimedia technologies. Transmission of multimedia data such as audio, video and pictures above the Internet is now-a-days e...
Researchers at Georgia Tech find FPGA chips used to control IoT devices are ripe for security compromises. They have a solution and challenge you to try to hack it.
A safeguarded fact transmitting is usually a critical matter pertaining to Wireless Sensor Networks (WSNs). Clustering is an effective in addition to realistic method to improve th...
A Tool for Protecting Electronic Data in Centralized database using Improved Advance Encryption Standard (AES) and Secure Hash Algorithm (SHA)
In recent years, there is a wide amount of data available; which can be any one's personal data or any organization's important data. The main problem is to hide sensitive informat...
With the development of cloud computing, the interest on spatial database outsourcing has been sharply increasing. Therefore, researches on data encryption methods for protecting l...
Now-a-days, security is one of the major problem facing all over the world. To protect the user's secret information from the strangers it is necessary to convert the information i...
Enhancing the Information Security Constraints for Speedy Transmissions using Encryption Methods over Android Platform
In this paper, the authors encrypt and decrypts the textual files, media files by using encrypt/decrypt cipher algorithm. Their aim was to develop the secure data transfer software...
WSNs are widely used in various medical, military, weather or several other applications. The trend of Wireless Sensor Networks (WSNs) is rising every year and they are being expos...