„Computer Security & Cryptography“
Suchergebnisse
576 Treffer
-
Hardware-based Computer Security Techniques to Defeat Hackers – From Biometrics to Quantum Cryptography
-
Network and System Security – 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings
-
Security and Cryptography for Networks – 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
-
Computer Security - ESORICS 2014 – 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
-
Computer Security - ESORICS 2014 – 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
-
Recent trends in computer networks and distributed systems security – second international conference ; proceedings
-
Security protocols XXI – 21th international workshop, Cambridge, UK, March 19 - 20, 2013 ; revised selected papers
-
Security, privacy, and applied cryptography engineering – third international conference ; proceedings
-
Lightweight cryptography for security and privacy – second international workshop ; revised selected papers
-
Security engineering and intelligence informatics – proceedings
-
Cryptology and network security – 11th international conference ; proceedings
-
Information security applications – 12th international workshop ; revised selected papers
-
Applied cryptography and network security – third international conference ; proceedings
-
Cryptology and network security – 8th international conference ; proceedings
-
Applied cryptography and network security – 10th international conference ; proceedings
-
Almost tight security in lattices with polynomial moduli—PRF, IBE, all-but-many LTF, and more
-
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT)
-
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements
-
Architectural views for social robots in public spaces: business, system, and security strategies
-
A comprehensive review of visual cryptography for enhancing high-security applications