„cryptography system“
Suchergebnisse
1.000+ Treffer
-
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination
-
Infant head and brain segmentation from magnetic resonance images using fusion-based deep learning strategies
-
Understanding Bitcoin – Cryptography, Engineering and Economics
-
Understanding Bitcoin – Cryptography, Engineering and Economics
-
Financial Cryptography and Data Security – 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers
-
Improving the I/O performance of intermediate multimedia storage nodes
-
Quantum Cryptography Based on an Algorithm for Determining a Function Using Qudit Systems
-
Advanced Concepts for Intelligent Vision Systems – 15th International Conference, ACIVS 2013, Poznań, Poland, October 28-31, 2013. Proceedings
-
Introduction to Biometrics
-
Правовое положение избирателей и наблюдателей в системе дистанционного электронного голосования в России
-
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
-
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost
-
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones
-
Building a holistic cybersecurity framework for e-Government based on a systematic analysis of proposals
-
The $$\mathrm {ACAC_{D}}$$ ACAC D model for mutable activity control and chain of dependencies in smart and connected systems
-
Automata, languages, and programming – 41st international colloquium ; proceedings
-
On the move to meaningful Internet systems: OTM 2011 workshops – confederated international workshops and posters: EI2N + NSF ICE ... 2011, Hersonissos, Crete, Greece, October 17 - 21, 2011 ; proceedings
-
Automata, Languages, and Programming – 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II
-
Interactive video retrieval in the age of effective joint embedding deep models: lessons from the 11th VBS
-
Cashing out crypto: state of practice in ransom payments