Search query: breaches

Categories: Computer Science: Encryption


13142 records searched, 13 records found


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words in this category for articles published in the last 45 days:
data (3), breaches (2), layoffs (2), optical (2)


Return to the site home page

Computer Science: Encryption
Published

Mass layoffs and data breaches could be connected      (via sciencedaily.com)     Original source 

A research team has been exploring how mass layoffs and data breaches could be connected. Their theo ...

Computer Science: Encryption
Published

New AI model can help prevent damaging and costly data breaches - New AI Model Can Help Prevent Damaging and Costly Data Breaches      (via sciencedaily.com) 

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for...

Computer Science: Encryption
Published

Researchers simulate privacy leaks in functional genomics studies - Researchers Simulate Privacy Leaks in Functional Genomics Studies      (via sciencedaily.com)     Original source 

Researchers demonstrate that it's possible to de-identify raw functional genomics data to ensure pat...

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...

Computer Science: Encryption
Published

Double locked: Polymer hydrogels secure confidential information - Double Locked: Polymer Hydrogels Secure Confidential Information      (via sciencedaily.com) 

The development of highly secure but simple and inexpensive encryption technology for the prevention...

Computer Science: Encryption Mathematics: Puzzles
Published

Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data      (via sciencedaily.com) 

Scientists have developed algorithms that more efficiently measure how difficult it would be for an...

Computer Science: Encryption Engineering: Biometric
Published

Securing data transfers with relativity - Securing Data Transfers with Relativity: A Comprehensive Guide      (via sciencedaily.com) 

To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge...

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas o...

Computer Science: Encryption Mathematics: Puzzles
Published

Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption      (via sciencedaily.com) 

SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...

No more articles found that match the search criteria