Search query: data
Categories: Computer Science: Encryption
13142 records searched, 56 records found, 20 matches displayed
< Previous 20 articles Next 20 articles >
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words in this category for articles published in the last 45 days:
data (3),
breaches (2),
layoffs (2),
optical (2)
Published New technique offers faster security for non-volatile memory tech - New Technique Offers Faster Security for Non-Volatile Memory Tech


Researchers have developed a technique that leverages hardware and software to improve file system s...
Published Keep it secret: Cloud data storage security approach taps quantum physics



Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum...
Published A security technique to fool would-be cyber attackers - A Security Technique to Fool Would-Be Cyber Attackers


Researchers developed a technique that effectively protects computer programs' secret information fr...
Published An uncrackable combination of invisible ink and artificial intelligence - An Uncrackable Combination of Invisible Ink and Artificial Intelligence


Coded messages in invisible ink sound like something only found in espionage books, but in real life...
Published 'PrivacyMic': For a smart speaker that doesn't eavesdrop - PrivacyMic: For a Smart Speaker That Doesn't Eavesdrop


Microphones are perhaps the most common electronic sensor in the world, with an estimated 320 millio...
Published Optical fibers fit for the age of quantum computing



A new generation of specialty optical fibers has been developed by physicists to cope with the chall...
Published Graphene key for novel hardware security - Graphene Key for Novel Hardware Security


As more private data is stored and shared digitally, researchers are exploring new ways to protect d ...
Published Technology has the potential to change the patient-provider relationship - Technology and the Patient-Provider Relationship: A New Era of Healthcare


As personal health records (AKA patient portals) allowing patients to see test results, medications...
Published Single-photon source paves the way for practical quantum encryption - Single-Photon Source Paves the Way for Practical Quantum Encryption


Researchers describe new high-purity single-photon source that can operate at room temperature. The...
Published Facial recognition ID with a twist: Smiles, winks and other facial movements for access - Facial Recognition ID with a Twist: Smiles, Winks, and Other Facial Movements for Access


Concurrent Two-Factor Identity Verification requires both one's facial identity and a specific facia...
Published Quantum systems learn joint computing - Quantum Systems Learn Joint Computing: A New Era of Computing


Researchers realize quantum-logic computer operation between two separate quantum modules in differe...
Published Quantum computing: When ignorance is wanted - Quantum Computing: When Ignorance is Wanted


Quantum technologies for computers open up new concepts of preserving the privacy of input and outpu...
Published Impenetrable optical OTP security platform - Impenetrable Optical OTP Security Platform: The Future of Data Protection


An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible...
Published Laser system generates random numbers at ultrafast speeds - Laser System Generates Random Numbers at Ultrafast Speeds


Scientists have developed a system that can generate random numbers over a hundred times faster than...
Published Real-world study shows the potential of gait authentication to enhance smartphone security - Real-World Study Shows the Potential of Gait Authentication to Enhance Smartphone Security


A study showed that -- within an appropriate framework -- gait recognition could be a viable techniq...
Published Quantum cryptography: Hacking is futile - Quantum Cryptography: Hacking is Futile


An international team has successfully implemented an advanced form of quantum cryptography for the...
Published Tiny, cheap solution for quantum-secure encryption - Tiny, Cheap Solution for Quantum-Secure Encryption


Engineers propose a new kind of encryption to protect data in the age of quantum computers. ABSTRACT ...
Published Scientific advance leads to a new tool in the fight against hackers - Scientific Advance Leads to a New Tool in the Fight Against Hackers


A new form of security identification could soon see the light of day and help us protect our data f ...
Published Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...
Published Quantum physicists make major nanoscopic advance - Quantum Physicists Make Major Nanoscopic Advance



In a new breakthrough, researchers have solved a problem that has caused quantum researchers headach...