„Computer Security & Cryptography“
Suchergebnisse
576 Treffer
-
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
-
An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
-
Protocols for Authentication and Key Establishment
-
Advanced Computer Network – Networking
-
Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography
-
Providing security and privacy to huge and vulnerable songs repository using visual cryptography
-
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
-
Fundamentals of Cryptography & Network Security
-
New Cryptography and Computer Security Teaching Methods Using Network Technologies
-
A curve based cryptography for wireless security in MANET
-
An open letter (21.01.2014) from US researchers in cryptography and information Security
-
Empirical Analysis of Computer System and Network Security – Overview about Cryptography, Computer Systems and Network Security Technologies
-
Communications and multimedia security – 15th IFIP TC 6 TC 11 international conference ; proceedings
-
E-Business and telecommunications – 7th international joint conference ; revised selected papers
-
Enhanced physical unclonable function structures in mixed-signal MOS technology
-
Digital Communication – Communication, Multimedia, Security
-
Digital Communication – communication, multimedia, security
-
Applied cryptography and network security – first international conference ; proceedings
-
Advances in Computing and Data Sciences – First International Conference, ICACDS 2016, Ghaziabad, India, November 11-12, 2016, Revised Selected Papers
-
Verifiable privacy protection for vehicular communication systems