Search results
Create the page "Applied cryptography" on this wiki! See also the search results found.
- applied cryptography intrusion detection data and application security5 KB (637 words) - 23:20, 14 October 2008
- Applied Soft Computing Information Security and Cryptography3 KB (412 words) - 19:34, 12 November 2020
- ..., devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clea ...of interest include, but are not limited to the following focus areas, as applied to mobile ICT:4 KB (451 words) - 23:37, 14 October 2008
- * Applied Soft Computing * Information Security and Cryptography3 KB (386 words) - 23:39, 14 October 2008
- Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc * CRYPTO: Cryptography13 KB (1,617 words) - 19:03, 24 November 2008
- ...ent original contributions on information technology security and privacy, applied or theoretical. More precisely, topics of this workshop include (but are no * Cryptography and cryptographic protocols.4 KB (506 words) - 17:07, 27 February 2009
- - applied cryptography6 KB (828 words) - 17:08, 27 February 2009
- Authentication and Identification, Cryptography and Security Protocols Visualization and Virtual Reality as Applied to Computational Science5 KB (578 words) - 10:21, 20 November 2020
- and beyond to discuss hot topics in applied network and systems * Cryptography4 KB (530 words) - 15:02, 27 December 2015
- Authentication and Identification, Cryptography and Security Protocols Visualization and Virtual Reality as Applied to Computational Science5 KB (599 words) - 10:21, 20 November 2020
- Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc ...raphy; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems6 KB (746 words) - 11:35, 2 August 2009
- - Authentication and Identification, Cryptography and Security Protocols - Visualization and Virtual Reality as Applied to Computational Science5 KB (667 words) - 14:27, 13 September 2009
- - Cryptography - Applied e-Business4 KB (507 words) - 22:37, 18 November 2009
- |Title=The 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies |Field=Communications, Biomedical, Applied sciences6 KB (758 words) - 18:02, 6 January 2010
- - Cryptography - Applied e-Business6 KB (732 words) - 05:52, 5 December 2010
- |Title=4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION TECHNOLOGIES |Field=Applied Sciences, Biotechnologies, ICT6 KB (776 words) - 18:20, 4 March 2011
- − Information Security and Applied Cryptography.3 KB (367 words) - 16:37, 27 December 2015
- and applied engineering and computer science subjects. The WCE conferences serve Cryptography8 KB (1,085 words) - 16:28, 6 February 2012
- - Cryptography - Applied e-Business5 KB (595 words) - 05:03, 15 January 2012
- |Title=19th International Conference on Applied Cryptography and Network Security ...ference focusing on current developments that advance the areas of applied cryptography, cyber security (including network and computer security) and privacy.''870 bytes (109 words) - 19:16, 22 January 2021