„Cryptography“
Suchergebnisse
6.388 Treffer
-
Auftragsverarbeitung – Kontrollrechte und -Pflichten
-
EUDI-Wallet und PID – eIDAS 2.0-Verordnung und die digitale Brieftasche
-
Evaluierung und Zertifizierung einer Videosprechstunde – Anwendung des DSGVO – information privacy standard in der Praxis
-
Transactions on Pattern Languages of Programming V
-
Universal Key: Fourier Transformation Innovative – Applications in Science and Technology
-
Financial Cryptography and Data Security – 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers
-
Financial Cryptography and Data Security – FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
Cybersecurity in the financial sector and the quantum-safe cryptography transition: in search of a precautionary approach in the EU Digital Operational Resilience Act framework
-
Cryptography and coding
-
Image cryptography communication using FPAA-based multi-scroll chaotic system
-
OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model
-
Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission
-
An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks
-
Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem
-
Cross layered cryptography based secure routing for IoT-enabled smart healthcare system
-
Low area FPGA implementation of PRESENT cryptography with 3S-RLKG and MKS
-
Adaptive model-free synchronization of different fractional-order neural networks with an application in cryptography
-
Privacy Technologies and Policy – 13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings
-
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems