„Computer Security & Cryptography“
Suchergebnisse
1.000+ Treffer
-
Understanding Bitcoin – Cryptography, Engineering and Economics
-
Understanding Bitcoin – Cryptography, Engineering and Economics
-
Lightweight Cryptography for Security and Privacy – Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
-
Financial Cryptography and Data Security – 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers
-
Cybersecurity Law
-
Privacy and Identity Management. Sharing in a Digital World – 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8–11, 2023, Revised Selected Papers
-
Financial cryptography and data security – 25th International Conference, FC 2021, virtual event, March 1-5, 2021, revised selected papers
-
Introduction to Cryptographic Definitions – A Step-by-Step Guide for Beginners
-
Multimedia security based on quantum cryptography and blockchain
-
Progress in Cryptology - AFRICACRYPT 2025 – 16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21–23, 2025, Proceedings
-
ICT Systems Security and Privacy Protection – 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II
-
An improved hybrid scheme for e-payment security using elliptic curve cryptography
-
Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for mobile devices
-
Human Factors on Secret Security: Case Studies on Code Secret Leakage, Cryptographic Updates, and Password Update Procedures
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle