Search query: breaches
Categories: Computer Science: Encryption
13142 records searched, 13 records found
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words in this category for articles published in the last 45 days:
data (3),
breaches (2),
layoffs (2),
optical (2)
Published Mass layoffs and data breaches could be connected



A research team has been exploring how mass layoffs and data breaches could be connected. Their theo ...
Published New AI model can help prevent damaging and costly data breaches - New AI Model Can Help Prevent Damaging and Costly Data Breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for...
Published Researchers simulate privacy leaks in functional genomics studies - Researchers Simulate Privacy Leaks in Functional Genomics Studies



Researchers demonstrate that it's possible to de-identify raw functional genomics data to ensure pat...
Published Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...
Published Double locked: Polymer hydrogels secure confidential information - Double Locked: Polymer Hydrogels Secure Confidential Information


The development of highly secure but simple and inexpensive encryption technology for the prevention...
Published Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data


Scientists have developed algorithms that more efficiently measure how difficult it would be for an...
Published Researchers discover that privacy-preserving tools leave private data anything but - Researchers Discover That Privacy-Preserving Tools Leave Private Data Anything But


Researchers explored whether private data could still be recovered from images that had been 'saniti...
Published Is your mobile provider tracking your location? New technology could stop it - Is Your Mobile Provider Tracking Your Location? New Technology Could Stop It


Right now, there is a good chance your phone is tracking your location -- even with GPS services tur...
Published Securing data transfers with relativity - Securing Data Transfers with Relativity: A Comprehensive Guide


To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data


Researchers have shown that a component of modern computer processors that enables different areas o...
Published Technology has the potential to change the patient-provider relationship - Technology and the Patient-Provider Relationship: A New Era of Healthcare


As personal health records (AKA patient portals) allowing patients to see test results, medications...
Published Chromo-encryption method encodes secrets with color - Chromo-encryption method encodes secrets with color


In a new approach to security that unites technology and art, E researchers have combined silver nan...
Published Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption


SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...