Search results

Jump to: navigation, search
  • applied cryptography intrusion detection data and application security
    5 KB (637 words) - 23:20, 14 October 2008
  • Applied Soft Computing Information Security and Cryptography
    3 KB (412 words) - 19:34, 12 November 2020
  • ..., devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clea ...of interest include, but are not limited to the following focus areas, as applied to mobile ICT:
    4 KB (451 words) - 23:37, 14 October 2008
  • * Applied Soft Computing * Information Security and Cryptography
    3 KB (386 words) - 23:39, 14 October 2008
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc * CRYPTO: Cryptography
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...ent original contributions on information technology security and privacy, applied or theoretical. More precisely, topics of this workshop include (but are no * Cryptography and cryptographic protocols.
    4 KB (506 words) - 17:07, 27 February 2009
  • - applied cryptography
    6 KB (828 words) - 17:08, 27 February 2009
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (578 words) - 10:21, 20 November 2020
  • and beyond to discuss hot topics in applied network and systems * Cryptography
    4 KB (530 words) - 15:02, 27 December 2015
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (599 words) - 10:21, 20 November 2020
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc ...raphy; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems
    6 KB (746 words) - 11:35, 2 August 2009
  • - Authentication and Identification, Cryptography and Security Protocols - Visualization and Virtual Reality as Applied to Computational Science
    5 KB (667 words) - 14:27, 13 September 2009
  • - Cryptography - Applied e-Business
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=The 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies |Field=Communications, Biomedical, Applied sciences
    6 KB (758 words) - 18:02, 6 January 2010
  • - Cryptography - Applied e-Business
    6 KB (732 words) - 05:52, 5 December 2010
  • |Title=4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION TECHNOLOGIES |Field=Applied Sciences, Biotechnologies, ICT
    6 KB (776 words) - 18:20, 4 March 2011
  • − Information Security and Applied Cryptography.
    3 KB (367 words) - 16:37, 27 December 2015
  • and applied engineering and computer science subjects. The WCE conferences serve Cryptography
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - Cryptography - Applied e-Business
    5 KB (595 words) - 05:03, 15 January 2012
  • |Title=19th International Conference on Applied Cryptography and Network Security ...ference focusing on current developments that advance the areas of applied cryptography, cyber security (including network and computer security) and privacy.''
    870 bytes (109 words) - 19:16, 22 January 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)