Search results
Create the page "Applied cryptography" on this wiki! See also the search results found.
- applied cryptography intrusion detection data and application security5 KB (637 words) - 23:20, 14 October 2008
- Applied Soft Computing Information Security and Cryptography3 KB (412 words) - 19:34, 12 November 2020
- ..., devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clea ...of interest include, but are not limited to the following focus areas, as applied to mobile ICT:4 KB (451 words) - 23:37, 14 October 2008
- * Applied Soft Computing * Information Security and Cryptography3 KB (386 words) - 23:39, 14 October 2008
- Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc * CRYPTO: Cryptography13 KB (1,617 words) - 19:03, 24 November 2008
- ...ent original contributions on information technology security and privacy, applied or theoretical. More precisely, topics of this workshop include (but are no * Cryptography and cryptographic protocols.4 KB (506 words) - 17:07, 27 February 2009
- - applied cryptography6 KB (828 words) - 17:08, 27 February 2009
- Authentication and Identification, Cryptography and Security Protocols Visualization and Virtual Reality as Applied to Computational Science5 KB (578 words) - 10:21, 20 November 2020
- and beyond to discuss hot topics in applied network and systems * Cryptography4 KB (530 words) - 15:02, 27 December 2015
- Authentication and Identification, Cryptography and Security Protocols Visualization and Virtual Reality as Applied to Computational Science5 KB (599 words) - 10:21, 20 November 2020
- Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc ...raphy; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems6 KB (746 words) - 11:35, 2 August 2009
- - Authentication and Identification, Cryptography and Security Protocols - Visualization and Virtual Reality as Applied to Computational Science5 KB (667 words) - 14:27, 13 September 2009
- - Cryptography - Applied e-Business4 KB (507 words) - 22:37, 18 November 2009
- |Title=The 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies |Field=Communications, Biomedical, Applied sciences6 KB (758 words) - 18:02, 6 January 2010
- ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno Cryptography and Foundation of Computer Security6 KB (670 words) - 12:28, 10 January 2010
- ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno * Cryptography and Foundation of Computer Security6 KB (704 words) - 13:01, 27 March 2020
- - Cryptography - Applied e-Business6 KB (732 words) - 05:52, 5 December 2010
- |Title=4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION TECHNOLOGIES |Field=Applied Sciences, Biotechnologies, ICT6 KB (776 words) - 18:20, 4 March 2011
- − Information Security and Applied Cryptography.3 KB (367 words) - 16:37, 27 December 2015
- and applied engineering and computer science subjects. The WCE conferences serve Cryptography8 KB (1,085 words) - 16:28, 6 February 2012