Search query: breaches
Categories: All Categories
13142 records searched, 25 records found, 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Securing data transfers with relativity - Securing Data Transfers with Relativity: A Comprehensive Guide
(via sciencedaily.com) 
To counter hacking, researchers have developed a new system based on the concept of 'zero-knowledge...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data
(via sciencedaily.com) 
Researchers have shown that a component of modern computer processors that enables different areas o...
Published Technology has the potential to change the patient-provider relationship - Technology and the Patient-Provider Relationship: A New Era of Healthcare
(via sciencedaily.com) 
As personal health records (AKA patient portals) allowing patients to see test results, medications...
Published Chromo-encryption method encodes secrets with color - Chromo-encryption method encodes secrets with color
(via sciencedaily.com) 
In a new approach to security that unites technology and art, E researchers have combined silver nan...
Published Using quantum Parrondo’s random walks for encryption - Using Quantum Parrondo's Random Walks for Encryption
(via sciencedaily.com) 
SUTD has set out to apply concepts from quantum Parrondo's paradox in search of a working protocol f...