Search Results for "secure data"

Find videos related to your search query. Browse through our collection of videos matching "secure data". Search across titles, descriptions, tags, and channels to discover the content you're looking for.

Search Results for "secure data"

50 results found

Secure data transfer based on visual cryptography
13:13

Secure data transfer based on visual cryptography

AmAn
122 views
Secure Data Transfer Over Internet Using Image Steganography
4:23

Secure Data Transfer Over Internet Using Image Steganography

Nevon Projects
15.6K views
Secure Data Transfer Based on Visual Cryptography- Working Demo
13:28

Secure Data Transfer Based on Visual Cryptography- Working Demo

AmAn
121 views
Unlocking cryptography to secure your data. AES,RSA,SHA, and MD5
0:40

Unlocking cryptography to secure your data. AES,RSA,SHA, and MD5

MossB Network
167 views
Secure Data Transfer Video Steganography Projects | Student Projects
3:24

Secure Data Transfer Video Steganography Projects | Student Projects

Python Projects
475 views
Speech Steganography | Data Hiding in Speech | Secure Speech File using Arduino or Raspberry-Pi
4:01

Speech Steganography | Data Hiding in Speech | Secure Speech File using Arduino or Raspberry-Pi

Techpacs
193 views
Is Any of Your Data Really Secure?
0:57

Is Any of Your Data Really Secure?

Neural Vibrations
280 views
Final Year Projects | Secure Data Hiding Algorithm using Encrypted Screte Message
8:55

Final Year Projects | Secure Data Hiding Algorithm using Encrypted Screte Message

ClickMyProject
2.3K views
Secure Medical Imaging Data using Cryptography | Classification |Brain Tumor Dataset | MATLAB | FYP
2:11

Secure Medical Imaging Data using Cryptography | Classification |Brain Tumor Dataset | MATLAB | FYP

Saqqiya Technology Point
170 views
SecRBAC: Secure data in the Clouds  ||best ieee 2017 java projects list.
10:40

SecRBAC: Secure data in the Clouds ||best ieee 2017 java projects list.

SD Pro Solutions Pvt Ltd
194 views
An RSA-Based Secure Image Steganography Technique Using Adaptive Data Hiding - Final
11:10

An RSA-Based Secure Image Steganography Technique Using Adaptive Data Hiding - Final

Akash Joy
22 views
How Secure Is Big Data Development? - Next LVL Programming
3:45

How Secure Is Big Data Development? - Next LVL Programming

NextLVLProgramming
0 views
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
5:28

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

MyProjectBazaar
18 views
What Is Symmetric-key Encryption And How Does It Secure Data? - Emerging Tech Insider
2:46

What Is Symmetric-key Encryption And How Does It Secure Data? - Emerging Tech Insider

Emerging Tech Insider
1 views
Locking Down Data: Cryptographic Protocols for Secure Communication Explained
2:47

Locking Down Data: Cryptographic Protocols for Secure Communication Explained

Operational Excellence Mastery
6 views
Secure your data and messages with a PolyAlphabetic Substitution Cipher.  Keeping it simple.
43:57

Secure your data and messages with a PolyAlphabetic Substitution Cipher. Keeping it simple.

Software Nuggets
230 views
πŸ” What is SHA-256? | How This Powerful πŸ”’ Hash Function Keeps Your Data Secure! πŸ›‘οΈ#sha256 #crypto
0:42

πŸ” What is SHA-256? | How This Powerful πŸ”’ Hash Function Keeps Your Data Secure! πŸ›‘οΈ#sha256 #crypto

BitnByte Mining
8.1K views
DNA Cryptography An New Approach to Secure Cloud Data in Java
19:58

DNA Cryptography An New Approach to Secure Cloud Data in Java

OKOKPROJECTS
161 views
HOW TO ENCRYPT YOUR DATA WITH EFS TO SECURE THEM
11:25

HOW TO ENCRYPT YOUR DATA WITH EFS TO SECURE THEM

McVision Richard
237 views
Secure Data Transfer Using Image Steganography through Socket Programming using Java
1:14

Secure Data Transfer Using Image Steganography through Socket Programming using Java

GOPINATHNAIDU CHENNAMSETTI
70 views
A SECURE DATA DYNAMICS AND PUBLIC AUDITING SCHEME FOR CLOUD STORAGE | CLOUD COMPUTING
7:13

A SECURE DATA DYNAMICS AND PUBLIC AUDITING SCHEME FOR CLOUD STORAGE | CLOUD COMPUTING

Takeoff Edu Group
523 views
Crypto with Steganography | Secure Your Data in Images! πŸ”πŸ–ΌοΈ
3:15

Crypto with Steganography | Secure Your Data in Images! πŸ”πŸ–ΌοΈ

Anjali
7 views
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in P... | RTCL.TV
0:51

Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in P... | RTCL.TV

Social RTCL TV
106 views
The Secret to Secure Data: Encryption by Ak. Coder
0:45

The Secret to Secure Data: Encryption by Ak. Coder

Ak. Coder
37 views
Best Encryption Software to Secure, Lock & Encrypt your Personal Data (Files, Folders) | EncryptPro
12:11

Best Encryption Software to Secure, Lock & Encrypt your Personal Data (Files, Folders) | EncryptPro

EncryptPro
26 views
Post Quantum Cryptography  Secure Data in the Quantum Age
1:00

Post Quantum Cryptography Secure Data in the Quantum Age

Relax Reels shorts
13 views
Unlocking Secure Data Mining: Cryptographic Algorithms Explained
2:54

Unlocking Secure Data Mining: Cryptographic Algorithms Explained

Operational Excellence Mastery
8 views
Asymmetric Algorithms & Hashing Explained Simply | CRISC Domain 4 | Secure Data & Digital Signatures
14:19

Asymmetric Algorithms & Hashing Explained Simply | CRISC Domain 4 | Secure Data & Digital Signatures

ISACA PREP ACADEMY
66 views
235_Study of secure data transmission based wavelets using steganography and cryptography techniques
13:14

235_Study of secure data transmission based wavelets using steganography and cryptography techniques

CMRCET CSE
11 views
Encryption 101: How to Secure Your Data with AES, RSA, and More!
10:26

Encryption 101: How to Secure Your Data with AES, RSA, and More!

Tim Can Code
64 views
Secure Data Transfer using Crytography and Image Steganography
3:25

Secure Data Transfer using Crytography and Image Steganography

TRU PROJECTS
218 views
Digital Signatures: Verify & Secure Your Data
0:44

Digital Signatures: Verify & Secure Your Data

Dr. Carmenatty - AI, Cybersecurity & Quantum Comp.
45 views
πŸ” RSA Encryption Explained: Secure Data Transmission! πŸŒπŸ’‘ | Cryptography & Crypto Wallets πŸ”‘#crypto
0:58

πŸ” RSA Encryption Explained: Secure Data Transmission! πŸŒπŸ’‘ | Cryptography & Crypto Wallets πŸ”‘#crypto

BitnByte Mining
145 views
Secure Data Communication And Cryptography Based On DNA based Message Encoding
3:02

Secure Data Communication And Cryptography Based On DNA based Message Encoding

Naren Projects
36 views
SECURE DATA TRANSFER USING CRYPTOGRAPHY AND HYBRID STEGANOGRAPHY
24:09

SECURE DATA TRANSFER USING CRYPTOGRAPHY AND HYBRID STEGANOGRAPHY

Ashna Choudhary
146 views
How Does Quantum Cryptography Secure Modern Data? - CountyOffice.org
3:30

How Does Quantum Cryptography Secure Modern Data? - CountyOffice.org

County Office Law
8 views
Cutting Edge Advances In Data Science - Secure Multiparty Computation - Brett Hemenway Falk
1:01:01

Cutting Edge Advances In Data Science - Secure Multiparty Computation - Brett Hemenway Falk

The Encrypted Economy
81 views
Is Telehealth Data Encryption Really Secure? - Gen Z Telehealth Guide
3:10

Is Telehealth Data Encryption Really Secure? - Gen Z Telehealth Guide

Gen Z Telehealth Guide
0 views
How to hide your secure data into an image using cmd
1:52

How to hide your secure data into an image using cmd

Try Tech
1.1K views
AI Hack Apocalypse πŸ€– Secure Your Data! πŸ”
0:47

AI Hack Apocalypse πŸ€– Secure Your Data! πŸ”

Explain It Simply
1.8K views
Large Prime Numbers & AI in Cryptography | Secure Data 2024
0:15

Large Prime Numbers & AI in Cryptography | Secure Data 2024

Digi Twins AI News
23 views
Secure your data - Deep dive into encryption and security (Android Dev Summit '19)
15:09

Secure your data - Deep dive into encryption and security (Android Dev Summit '19)

Android Developers
44.3K views
Understanding Asymmetric Key Algorithms: How They Keep Your Data Secure
5:09

Understanding Asymmetric Key Algorithms: How They Keep Your Data Secure

securityconceptsnotes
80 views
Tutorial 5a: Advances in Cryptography and Secure Hardware for Data Outsourcing
1:30:44

Tutorial 5a: Advances in Cryptography and Secure Hardware for Data Outsourcing

IEEE ICDE
230 views
Secure Data Transfer Using Image Steganography | 4K
1:30

Secure Data Transfer Using Image Steganography | 4K

Don Escriba
301 views
MONA  SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD
1:18

MONA SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD

Gagner Technologies
211 views
Secure your sensitive data with VeraCrypt
19:34

Secure your sensitive data with VeraCrypt

OPSEC IT
1 views
[PDF Download] Security with Noisy Data: On Private Biometrics Secure Key Storage and Anti-Counterfeiting
0:07

[PDF Download] Security with Noisy Data: On Private Biometrics Secure Key Storage and Anti-Counterfeiting

Refaeni32
13 views
MySejahtera data is secure, sole property of govt, says Khairy
2:32

MySejahtera data is secure, sole property of govt, says Khairy

The Star
358 views
How secure is the data you're sharing with dating, fertility apps?
1:08

How secure is the data you're sharing with dating, fertility apps?

Australian Community Media
2.2K views