Search query: data
Categories: Computer Science: Encryption
13142 records searched, 56 records found, top 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words in this category for articles published in the last 45 days:
data (3),
breaches (2),
layoffs (2),
optical (2)
Published How randomized data can improve our security


With an innovative approach, scientists are creating new standards for data security in the cache of ...
Published Accelerating AI tasks while preserving data security



SecureLoop is a new search engine that can identify an optimal design for a deep neural network acce...
Published Mass layoffs and data breaches could be connected



A research team has been exploring how mass layoffs and data breaches could be connected. Their theo ...
Published New twist on DNA data storage lets users preview stored files - New Twist on DNA Data Storage Lets Users Preview Stored Files


Researchers have turned a longstanding challenge in DNA data storage into a tool, using it to offer ...
Published Big data privacy for machine learning just got 100 times cheaper - Big Data Privacy for Machine Learning Just Got 100 Times Cheaper


Computer scientists have discovered an inexpensive way for tech companies to implement a rigorous fo...
Published Double locked: Polymer hydrogels secure confidential information - Double Locked: Polymer Hydrogels Secure Confidential Information


The development of highly secure but simple and inexpensive encryption technology for the prevention...
Published Researchers improve data readout by using 'quantum entanglement' - Researchers Improve Data Readout by Using 'Quantum Entanglement'


Researchers say they have been able to greatly improve the readout of data from digital memories - t ...
Published Say goodbye to the dots and dashes to enhance optical storage media - Say Goodbye to the Dots and Dashes to Enhance Optical Storage Media


A new technology is aimed at modernizing the optical digital storage technology. This advancement al...
Published Clear guidelines needed for synthetic data to ensure transparency, accountability and fairness, study says



Clear guidelines should be established for the generation and processing of synthetic data to ensure ...
Published This tiny chip can safeguard user data while enabling efficient computing on a smartphone



A new chip can efficiently accelerate machine-learning workloads on edge devices like smartphones wh...
Published Mechanical computer relies on kirigami cubes, not electronics



Researchers have developed a kirigami-inspired mechanical computer that uses a complex structure of...
Published Securing data transfers with relativity - Securing Data Transfers with Relativity: A Comprehensive Guide


To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge...
Published Algorithms improve how we protect our data - Algorithms Improve How We Protect Our Data


Scientists have developed algorithms that more efficiently measure how difficult it would be for an...
Published Researchers simulate privacy leaks in functional genomics studies - Researchers Simulate Privacy Leaks in Functional Genomics Studies



Researchers demonstrate that it's possible to de-identify raw functional genomics data to ensure pat ...
Published Researchers discover that privacy-preserving tools leave private data anything but - Researchers Discover That Privacy-Preserving Tools Leave Private Data Anything But


Researchers explored whether private data could still be recovered from images that had been 'saniti ...
Published New AI model can help prevent damaging and costly data breaches - New AI Model Can Help Prevent Damaging and Costly Data Breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data


Researchers have shown that a component of modern computer processors that enables different areas o...
Published Chromo-encryption method encodes secrets with color - Chromo-encryption method encodes secrets with color


In a new approach to security that unites technology and art, E researchers have combined silver nan...
Published Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment


Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...
Published Is your mobile provider tracking your location? New technology could stop it - Is Your Mobile Provider Tracking Your Location? New Technology Could Stop It


Right now, there is a good chance your phone is tracking your location -- even with GPS services tur...