Data protection through Data Encryption.

被引:0
|
作者
Erickson, Charles R.
机构
来源
Elektronik Munchen | 1979年 / 28卷 / 19期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The marked increase in data traffic and greater requirements for data protection are making data encryption steadily more important. This article looks at the methods and the components in VLSI technology that enable them to work according to data encryption standards.
引用
收藏
页码:45 / 51
相关论文
共 50 条
  • [1] DATA ENCRYPTION.
    Powers, Ian
    New Electronics, 1980, 13 (04):
  • [2] DATA AND VOICE ENCRYPTION.
    Yatsuboshi, Reigo
    Fujisaki, Yozo
    Akiyama, Ryota
    Fujitsu Scientific and Technical Journal, 1986, 22 (04): : 331 - 342
  • [3] DEDICATED PROCESSOR BRINGS ECONOMY TO DATA ENCRYPTION.
    Wallace, Joe
    Matney, Roy
    Electronic Design, 1983, 31 (08) : 143 - 146
  • [4] Supply chain optimization: cross-chain data privacy protection scheme based on semi-homomorphic encryption.
    Guo, Yahui
    Cai, Zhiming
    Chen, Jian
    Hu, Shanwen
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 86 - 91
  • [5] COMMERCIAL ENCRYPTION.
    Hellman, Martin E.
    IEEE Network, 1987, 1 (02): : 6 - 10
  • [6] DIRECTLY TRANSFORMED LINK ENCRYPTION.
    Matsumoto, Tsutomu
    Okada, Tomoko
    Imai, Hideki
    Systems, computers, controls, 1982, 13 (06): : 36 - 44
  • [7] PRESERVATION OF NETWORK INTEGRITY WITH ENCRYPTION.
    Reel, Nanci H.
    Telecommunications (International Edition), 1985, 19 (05): : 76 - 84
  • [8] The Data Protection of MapReduce Using Homomorphic Encryption
    Chen, Xu
    Huang, Qiming
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 419 - 421
  • [9] ENCRYPTION PROTECTION OF DATA AND COMPUTER-SYSTEMS
    PRITCHARD, J
    INFORMATION PRIVACY, 1979, 1 (04): : 154 - 159
  • [10] Mobile encryption for laptop data protection (MELP)
    Kao, Y. -W.
    Zhang, X.
    Studer, A.
    Perrig, A.
    IET INFORMATION SECURITY, 2012, 6 (04) : 291 - 298