Search results

Jump to: navigation, search
  • * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 16:48, 14 October 2008
  • Techniques and Applications index distribution schemes, memory management techniques, etc.
    5 KB (644 words) - 22:10, 14 October 2008
  • ...Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, l * Cryptographic primitives for wireless communication
    2 KB (291 words) - 22:19, 14 October 2008
  • * Techniques and Tools for Formal Verification * game theoretic aspects of cryptographic protocols
    6 KB (682 words) - 09:18, 14 April 2020
  • ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;
    13 KB (1,617 words) - 18:03, 24 November 2008
  • Communications Techniques and Technologies * IF/RF Technologies and Techniques
    5 KB (526 words) - 00:02, 2 February 2009
  • * Cryptographic techniques and key management * Cryptographic hardware design
    16 KB (2,178 words) - 11:59, 18 January 2009
  • * Cryptographic protocols and key management in UCS * System/network management techniques and strategies in UE.
    6 KB (793 words) - 14:12, 1 October 2020
  • - applications of cryptographic techniques - techniques for developing secure systems
    12 KB (1,690 words) - 16:08, 27 February 2009
  •  Wireless Routing TechniquesCryptographic Algorithms and their Applications
    5 KB (578 words) - 09:21, 20 November 2020
  •  Wireless Routing TechniquesCryptographic Algorithms and their Applications
    5 KB (599 words) - 09:21, 20 November 2020
  • ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;
    6 KB (746 words) - 10:35, 2 August 2009
  • - Wireless Routing Techniques - Cryptographic Algorithms and their Applications
    5 KB (667 words) - 13:27, 13 September 2009
  • * Cryptographic techniques and key management * Cryptographic hardware design
    10 KB (1,270 words) - 16:12, 20 April 2010
  • * › Cryptographic Techniques and Key Management Area 3: Cryptographic Techniques and Key Management
    4 KB (409 words) - 14:40, 5 February 2010
  • - Cryptographic protocols and key management in UCS - System/network management techniques and strategies in UE.
    3 KB (498 words) - 01:52, 22 December 2012
  • * Attacks with novel insights, techniques, or results * Analysis of deployed cryptography and cryptographic protocols
    3 KB (343 words) - 15:31, 6 May 2020
  • ...representation, network management, network optimization, problem solution techniques, and so on), to communicate the network devices to transfer data between th ...unication layer. Algorithms and protocols based on artificial intelligence techniques for network management, network monitoring, quality of service enhancement,
    6 KB (833 words) - 14:16, 24 September 2020
  • *Novel cryptographic algorithms for VANETs *Secure and privacy‐preserving aggregation techniques for VANETs
    2 KB (233 words) - 05:32, 20 September 2016
  • |Field=Cryptographic Techniques
    244 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    287 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    273 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    284 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    273 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    250 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    256 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    263 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    289 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    252 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    252 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    274 bytes (32 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    251 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    261 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    284 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    244 bytes (29 words) - 13:16, 9 October 2016
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques
    376 bytes (39 words) - 13:43, 9 April 2021
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    263 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    255 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    266 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    254 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    259 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    260 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    145 bytes (16 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    258 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    288 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    264 bytes (28 words) - 13:16, 9 October 2016
  • techniques; satisfiability modulo theories; combinations of logics and deductive and hash-based cryptographic primitives; algebraic cryptanalysis, algebraic
    5 KB (670 words) - 12:24, 28 July 2017
  • exchange and dissemination of new ideas, techniques and research in Cryptographic Protocols
    3 KB (347 words) - 18:48, 22 November 2017
  • -Cryptographic protocols against insider threats -Data breach modeling and mitigation techniques
    5 KB (611 words) - 10:47, 8 August 2017
  • particular, novel techniques and mechanisms aimed at the security and privacy Papers with a strong cryptographic background will not be considered as part of
    4 KB (547 words) - 08:58, 21 August 2017
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques ...widely used standards, cryptographic protocols, quantum cryptography, and cryptographic currencies.
    1 KB (168 words) - 11:19, 24 May 2019
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques
    975 bytes (117 words) - 11:30, 24 May 2019
  • ...analysis. On the one hand, provable security provides confidence in using cryptographic schemes and protocols for various real-world applications, but on the other All aspects of provable security in constructing and analyzing cryptographic primitives, including but are not limited to:
    3 KB (445 words) - 10:59, 9 April 2020
  • ...ers; Performance optimization for NFV; SDN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity ...security and privacy in Internet of Things; Lightweight implementations of cryptographic stacks; Experiences with Open Platforms and hardware within Internet of Thi
    13 KB (1,550 words) - 01:20, 10 July 2020
  • ...nature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometr Intelligent techniques, logics, and systems
    18 KB (2,036 words) - 01:36, 10 July 2020
  • ...ng technologies and methods; Sealed-bid auctions; Trusted smart contracts; Cryptographic Web applications; Real estate: titles&tokens ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to
    15 KB (1,886 words) - 15:16, 25 August 2020
  • 5G Edge caching techniques; Performance in 5G networks; Security and implementations of cryptographic stacks; Experiences with Open
    13 KB (1,607 words) - 18:32, 30 November 2020
  • Multimedia meta-modeling techniques and operating systems; Multimedia systems and services; Security, privacy, and cryptographic protocols;
    10 KB (1,212 words) - 13:36, 29 December 2020
  • |Title=Conference on Cryptographic Hardware and Embedded Systems Cryptographic implementations:
    3 KB (288 words) - 16:03, 7 April 2021
  • ...ort for multimedia data; Multimedia data storage; Multimedia meta-modeling techniques and operating systems; Multimedia signal coding and processing (audio, vide ...tion,… ); Mobile multimedia systems and services; Security, privacy, and cryptographic protocols; Network security issues and protocols; Key management and authen
    10 KB (1,221 words) - 02:35, 3 December 2021