„Computer Security & Cryptography“
Suchergebnisse
576 Treffer
-
Constructive Approaches for Security Analysis and Design of Embedded Systems – First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings
-
Progress in Cryptology – LATINCRYPT 2025 – 9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1–3, 2025, Proceedings
-
Advances in Cryptology – CRYPTO 2025 – 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2025, Proceedings, Part VI
-
Quantum Protocols in Blockchain Security
-
Information Security and Privacy – 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part III
-
Applied Cryptography and Network Security Workshops – ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23–26, 2025, Revised Selected Papers, Part I
-
A risk and conformity assessment framework to ensure security and resilience of healthcare systems and medical supply chain
-
Transactions on Pattern Languages of Programming III
-
Communications and Multimedia Security – 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings
-
Techniques for Cryptanalysis of Block Ciphers
-
A Study of Statistical Zero-Knowledge Proofs
-
RFC 9116 (“security.txt”) an deutschen Hochschulservern
-
Security Standardisation Research – 9th International Conference, SSR 2024, Kunming, China, December 16, 2024, Proceedings
-
Quantifying and mitigating privacy risks in biomedical data
-
Security and Privacy in Communication Networks – 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28–30, 2024, Proceedings, Part III
-
Electronic Voting – 10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings
-
Codebasierte Post-Quanten-Kryptografie – Goppa Codes und das McEliece Kryptosystem
-
A systematic review on advanced encryption standard cryptography to enhance message security
-
Adaptive trust evaluation model based on container security analysis in the Docker platform
-
Verifiable Privacy Protection for Vehicular Communication Systems