Data Encryption
Resource Information
The concept Data Encryption represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
The Resource
Data Encryption
Resource Information
The concept Data Encryption represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
- Label
- Data Encryption
120 Items that share the Concept Data Encryption
Context
Context of Data EncryptionSubject of
No resources found
No enriched resources found
- Advances in Cryptology – CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I
- Advances in Cryptology – CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II
- Advances in Cryptology – CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III
- Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II
- Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I
- Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, revised selected papers
- Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings
- Advances in Information and Computer Security : 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
- Advances in cryptology -- CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I
- Advances in cryptology -- CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
- Advances in cryptology -- CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III
- Advances in cryptology-- CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
- Advances in cryptology-- CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
- Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings
- Applied cryptography and network security : 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
- Automated firewall analytics : design, configuration and optimization
- Beginning ethical hacking with Python
- Binary quadratic forms : an algorithmic approach
- Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government : 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E'2005), October 28-30, 2005, Poznan, Poland
- Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I
- Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II
- Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
- Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
- Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
- Computer security-- ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- Constructive Side-Channel Analysis and Secure Design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedings
- Cryptographic hardware and embedded systems -- CHES 2016 : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings
- Cryptography and coding : 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings
- Cryptography and security systems : third international conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
- Cryptology and Network Security (vol. # 3810) : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings
- Cryptology and network security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
- Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
- Cryptology and network security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings
- Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
- Digital Forensics and Watermarking : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings
- Digital Watermarking (vol. # 4283) : 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings
- Digital-forensics and watermarking : 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised selected papers
- Distributed Computing and Internet Technology : 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11-13, 2018, Proceedings
- Electronic voting : first International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, proceedings
- Embedded security in cars : securing current and future automotive IT applications
- Emerging Directions in Embedded and Ubiquitous Computing : EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedings
- Emerging directions in embedded and ubiquitous computing : EUC 2006 workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, seoul, Korea, August 1-4, 2006 proceedings
- Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats
- Ethical and social issues in the information age
- Ethical and social issues in the information age
- Fast software encryption : 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised selected papers
- Fault tolerant architectures for cryptography and hardware security
- Formal Aspects of Security : First International Conference, FASec 2002, London, UK, December 16-18, 2002. Revised Papers
- Foundations and practice of security : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011 : revised selected papers
- Foundations and practice of security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised selected papers
- Foundations of security analysis and design VII : FOSAD 2012/2013 tutorial lectures
- Future data and security engineering : first International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
- Future data and security engineering : second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings
- Future data and security engineering : third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings
- Handbook of Multibiometrics
- Information Security Practice and Experience (vol. # 3439) : First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
- Information Security and Privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
- Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings
- Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings
- Information security and cryptology -- ICISC 2013 : 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised selected papers
- Information security and cryptology -- ICISC 2017 : 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised selected papers
- Information security and cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised selected papers
- Information security and privacy : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings
- Information security practice and experience : 5th international conference, ISPEC 2009, Xi'an, China, April 13-15, 2009 ; proceedings
- Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 ; proceedings
- Information theoretic security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008 : proceedings
- Internet of Vehicles - Safe and Intelligent Mobility : Second International Conference, IOV 2015, Chengdu, China, December 19-21, 2015, Proceedings
- Lattices applied to coding for reliable and secure communications
- Mathematical methods in computer science : essays in memory of Thomas Beth
- Network and System Security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings
- Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine
- Privacy Enhancing Technologies : Second International Workshop, PET 2002 San Francisco, CA, USA, April 14-15, 2002 Revised Papers
- Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings
- Privacy preserving data mining
- Privacy, security, and trust within the context of pervasive computing
- Privacy-respecting intrusion detection
- Progress in Cryptology – INDOCRYPT 2017 : 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings
- Progress in Cryptology - INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings
- Progress in Cryptology - INDOCRYPT 2005 : 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings
- Progress in Cryptology - Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings
- Progress in Cryptology - VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers
- Progress in Cryptology -- INDOCRYPT 2014 : 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings
- Progress in Cryptology -- INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
- Progress in cryptology -- INDOCRYPT 2016 : 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings
- Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
- Provable Security : 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings
- Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
- Public Key Infrastructure (vol. # 3545) : Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers
- Public Key Infrastructure (vol. # 4043) : Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings
- RFID security : techniques, protocols and system-on-chip design
- Risks and Security of Internet and Systems : 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers
- Secure IT Systems : 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings
- Secure IT systems : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
- Security Protocols (vol. # 3364) : 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers
- Security Standardisation Research : Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedings
- Security and cryptography for networks : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
- Security and privacy in communication networks : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings
- Security and privacy in communication networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings
- Security for telecommunications networks
- Security protocols XXIII : 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers
- Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
- Security, Privacy, and Applied Cryptography Engineering : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings
- Security, privacy, and applied cryptography engineering : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings
- Security, privacy, and applied cryptography engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings
- Smart computing and communication : first International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings
- Synchronizing Internet Protocol Security (SIPSec)
- Technology and practice of passwords : International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers
- The InfoSec handbook : an introduction to information security
- Topics in Cryptology? CT-RSA 2007 : the Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings
- Topics in cryptology -- CT-RSA 2017 : the Cryptographers' track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings
- Transactions on large-scale data- and knowledge-centered systems XXXI : special issue on data and security engineering
- Trust, Privacy and Security in Digital Business : 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings
- Trust, Privacy, and Security in Digital Business : Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings
- Trust, privacy, and security in digital business : 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
- Trusted Computing and Information Security : 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings
- Trusted computing platforms : design and applications
- Unconstrained Face Recognition
- Understanding intrusion detection through visualization
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/ZkGNvhJGvlQ/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/ZkGNvhJGvlQ/">Data Encryption</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Data Encryption
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/ZkGNvhJGvlQ/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/ZkGNvhJGvlQ/">Data Encryption</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>