Search results

Jump to: navigation, search
  • applied cryptography intrusion detection data and application security
    5 KB (637 words) - 23:20, 14 October 2008
  • Applied Soft Computing Information Security and Cryptography
    3 KB (412 words) - 19:34, 12 November 2020
  • ..., devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clea ...of interest include, but are not limited to the following focus areas, as applied to mobile ICT:
    4 KB (451 words) - 23:37, 14 October 2008
  • * Applied Soft Computing * Information Security and Cryptography
    3 KB (386 words) - 23:39, 14 October 2008
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc * CRYPTO: Cryptography
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...ent original contributions on information technology security and privacy, applied or theoretical. More precisely, topics of this workshop include (but are no * Cryptography and cryptographic protocols.
    4 KB (506 words) - 17:07, 27 February 2009
  • - applied cryptography
    6 KB (828 words) - 17:08, 27 February 2009
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (578 words) - 10:21, 20 November 2020
  • and beyond to discuss hot topics in applied network and systems * Cryptography
    4 KB (530 words) - 15:02, 27 December 2015
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (599 words) - 10:21, 20 November 2020
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc ...raphy; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems
    6 KB (746 words) - 11:35, 2 August 2009
  • - Authentication and Identification, Cryptography and Security Protocols - Visualization and Virtual Reality as Applied to Computational Science
    5 KB (667 words) - 14:27, 13 September 2009
  • - Cryptography - Applied e-Business
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=The 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies |Field=Communications, Biomedical, Applied sciences
    6 KB (758 words) - 18:02, 6 January 2010
  • ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno Cryptography and Foundation of Computer Security
    6 KB (670 words) - 12:28, 10 January 2010
  • ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno * Cryptography and Foundation of Computer Security
    6 KB (704 words) - 13:01, 27 March 2020
  • - Cryptography - Applied e-Business
    6 KB (732 words) - 05:52, 5 December 2010
  • |Title=4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION TECHNOLOGIES |Field=Applied Sciences, Biotechnologies, ICT
    6 KB (776 words) - 18:20, 4 March 2011
  • − Information Security and Applied Cryptography.
    3 KB (367 words) - 16:37, 27 December 2015
  • and applied engineering and computer science subjects. The WCE conferences serve Cryptography
    8 KB (1,085 words) - 16:28, 6 February 2012

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)