Search query: data
Categories: Computer Science: Encryption
13142 records searched, 56 records found, 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words in this category for articles published in the last 45 days:
data (3),
breaches (2),
layoffs (2),
optical (2)
Published Researchers propose methods for automatic detection of doxing - Researchers Propose Methods for Automatic Detection of Doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or per...
Published A nanoantenna for long-distance, ultra-secure communication - A Nanoantenna for Long-Distance, Ultra-Secure Communication


Researchers have used a nanoantenna to focus light onto a single semiconductor nanobox. This approac...
Published Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption


SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...
Published Physicists observe competition between magnetic orders - Physicists Observe Competition Between Magnetic Orders


Two-dimensional materials, consisting of a single layer of atoms, have been booming in research for...
Published Compact quantum computer for server centers - Compact Quantum Computer for Server Centers: The Future of Computing


Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists hav...
Published Physicists describe photons’ characteristics to protect future quantum computing - Physicists Describe Photons’ Characteristics to Protect Future Quantum Computing


Physicists have described in theoretical terms how to develop codes that cannot be broken by quantum...
Published Secure communication with light particles - Secure Communication with Light Particles: A Breakthrough in Quantum Cryptography


While quantum computers offer many novel possibilities, they also pose a threat to internet security...
Published The power of chaos: A robust and low-cost cryptosystem for the post-quantum era - The Power of Chaos: A Robust and Low-Cost Cryptosystem for the Post-Quantum Era


Scientists develop a chaos-based stream cipher that can withstand attacks from large-scale quantum c...
Published Computer scientists discover new vulnerability affecting computers globally - Computer Scientists Discover New Vulnerability Affecting Computers Globally


A team o computer science researchers has uncovered a line of attack that breaks all Spectre defense...
Published One material with two functions could lead to faster memory - One Material with Two Functions Could Lead to Faster Memory


Researchers have developed a new light-emitting memory device by integrating a resistive random-acce...
Published Quantum networks in our future - Quantum Networks in Our Future: The Next Frontier of Communication


Investigators outline how a time-sensitive network control plane could be a key component of a worka...
Published New breakthrough enables perfectly secure digital communications - New Breakthrough Enables Perfectly Secure Digital Communications


Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the...
Published From bits to p-bits: One step closer to probabilistic computing - From Bits to P-Bits: One Step Closer to Probabilistic Computing


Scientists have developed a mathematical description of what happens within tiny magnets as they flu...
Published IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...
Published New chip hides wireless messages in plain sight - New Chip Hides Wireless Messages in Plain Sight


Researchers have developed a method for incorporating security in the physical nature of the wireles...
Published 'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz - Pulling Back the Curtain: Revealing the Molecular Key to The Wizard of Oz


Many people and companies worry about sensitive data getting hacked, so encrypting files with digita ...