„(lcsh)Cryptography.“
Suchergebnisse
1.000+ Treffer
-
Commutative cryptanalysis as a generalization of differential cryptanalysis
-
Nachruf: Spiros Simitis
-
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination
-
Infant head and brain segmentation from magnetic resonance images using fusion-based deep learning strategies
-
Understanding Bitcoin – Cryptography, Engineering and Economics
-
Understanding Bitcoin – Cryptography, Engineering and Economics
-
Experimental composable key distribution using discrete-modulated continuous variable quantum cryptography
-
Virtuelles Weiterleben – Rechtmäßigkeit der Datenverarbeitung und Umsetzung von Informationspflichten
-
Datenschutz-Vorsorge – Anwendbarkeit jenseits der Forschung und Einbettung in das geltende Datenschutzrecht
-
Spectral-null codes and null spaces of Hadamard submatrices
-
Kryptoagilität
-
Improving the I/O performance of intermediate multimedia storage nodes
-
Quantum Cryptography Based on an Algorithm for Determining a Function Using Qudit Systems
-
Quantum-resilient framework for healthcare data security using multivariate polynomial cryptography
-
A Life's Work in Geometry: An Homage to Hanfried Lenz
-
Projective Planes, Coverings and a Network Problem
-
Kryptoagilität: Ist die Zeit gekommen?
-
Privacy and Identity Management. Sharing in a Digital World – 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8–11, 2023, Revised Selected Papers
-
Wie Deutschland zur Cybernation wird – Die selbsterfüllende Prophezeiung
-
Introduction to Biometrics