Search results
Create the page "Cryptographic Techniques" on this wiki! See also the search results found.
- * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques3 KB (431 words) - 17:48, 14 October 2008
- Techniques and Applications index distribution schemes, memory management techniques, etc.5 KB (644 words) - 23:10, 14 October 2008
- ...Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, l * Cryptographic primitives for wireless communication2 KB (291 words) - 23:19, 14 October 2008
- * Techniques and Tools for Formal Verification * game theoretic aspects of cryptographic protocols6 KB (682 words) - 10:18, 14 April 2020
- ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;13 KB (1,617 words) - 19:03, 24 November 2008
- Communications Techniques and Technologies * IF/RF Technologies and Techniques5 KB (526 words) - 01:02, 2 February 2009
- * Cryptographic techniques and key management * Cryptographic hardware design16 KB (2,178 words) - 12:59, 18 January 2009
- * Cryptographic protocols and key management in UCS * System/network management techniques and strategies in UE.6 KB (793 words) - 15:12, 1 October 2020
- - applications of cryptographic techniques - techniques for developing secure systems12 KB (1,690 words) - 17:08, 27 February 2009
- Wireless Routing Techniques Cryptographic Algorithms and their Applications5 KB (578 words) - 10:21, 20 November 2020
- Wireless Routing Techniques Cryptographic Algorithms and their Applications5 KB (599 words) - 10:21, 20 November 2020
- ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;6 KB (746 words) - 11:35, 2 August 2009
- - Wireless Routing Techniques - Cryptographic Algorithms and their Applications5 KB (667 words) - 14:27, 13 September 2009
- * Cryptographic techniques and key management * Cryptographic hardware design10 KB (1,270 words) - 17:12, 20 April 2010
- * › Cryptographic Techniques and Key Management Area 3: Cryptographic Techniques and Key Management4 KB (409 words) - 15:40, 5 February 2010
- - Cryptographic protocols and key management in UCS - System/network management techniques and strategies in UE.3 KB (498 words) - 02:52, 22 December 2012
- * Attacks with novel insights, techniques, or results * Analysis of deployed cryptography and cryptographic protocols3 KB (343 words) - 16:31, 6 May 2020
- ...representation, network management, network optimization, problem solution techniques, and so on), to communicate the network devices to transfer data between th ...unication layer. Algorithms and protocols based on artificial intelligence techniques for network management, network monitoring, quality of service enhancement,6 KB (833 words) - 15:16, 24 September 2020
- *Novel cryptographic algorithms for VANETs *Secure and privacy‐preserving aggregation techniques for VANETs2 KB (233 words) - 06:32, 20 September 2016
- |Field=Cryptographic Techniques244 bytes (29 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques287 bytes (33 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques273 bytes (29 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques270 bytes (31 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques284 bytes (30 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques268 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques273 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques250 bytes (30 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques256 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques267 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques270 bytes (29 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques263 bytes (29 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques289 bytes (33 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques252 bytes (27 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques252 bytes (27 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques274 bytes (32 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques251 bytes (27 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques261 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques284 bytes (30 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques270 bytes (31 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques244 bytes (29 words) - 14:16, 9 October 2016
- ...l International Conference on the Theory and Applications of Cryptographic Techniques376 bytes (39 words) - 14:43, 9 April 2021
- |Field=Cryptographic Techniques267 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques263 bytes (31 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques268 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques268 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques255 bytes (30 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques266 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques254 bytes (29 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques259 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques260 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques145 bytes (16 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques267 bytes (28 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques258 bytes (29 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques288 bytes (33 words) - 14:16, 9 October 2016
- |Field=Cryptographic Techniques264 bytes (28 words) - 14:16, 9 October 2016
- techniques; satisfiability modulo theories; combinations of logics and deductive and hash-based cryptographic primitives; algebraic cryptanalysis, algebraic5 KB (670 words) - 13:24, 28 July 2017
- exchange and dissemination of new ideas, techniques and research in Cryptographic Protocols3 KB (347 words) - 19:48, 22 November 2017
- -Cryptographic protocols against insider threats -Data breach modeling and mitigation techniques5 KB (611 words) - 11:47, 8 August 2017
- particular, novel techniques and mechanisms aimed at the security and privacy Papers with a strong cryptographic background will not be considered as part of4 KB (547 words) - 09:58, 21 August 2017
- ...l International Conference on the Theory and Applications of Cryptographic Techniques ...widely used standards, cryptographic protocols, quantum cryptography, and cryptographic currencies.1 KB (168 words) - 12:19, 24 May 2019
- ...l International Conference on the Theory and Applications of Cryptographic Techniques975 bytes (117 words) - 12:30, 24 May 2019
- ...analysis. On the one hand, provable security provides confidence in using cryptographic schemes and protocols for various real-world applications, but on the other All aspects of provable security in constructing and analyzing cryptographic primitives, including but are not limited to:3 KB (445 words) - 11:59, 9 April 2020
- ...ers; Performance optimization for NFV; SDN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity ...security and privacy in Internet of Things; Lightweight implementations of cryptographic stacks; Experiences with Open Platforms and hardware within Internet of Thi13 KB (1,550 words) - 02:20, 10 July 2020
- ...nature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometr Intelligent techniques, logics, and systems18 KB (2,036 words) - 02:36, 10 July 2020
- ...ng technologies and methods; Sealed-bid auctions; Trusted smart contracts; Cryptographic Web applications; Real estate: titles&tokens ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to15 KB (1,886 words) - 16:16, 25 August 2020
- 5G Edge caching techniques; Performance in 5G networks; Security and implementations of cryptographic stacks; Experiences with Open13 KB (1,607 words) - 19:32, 30 November 2020
- Multimedia meta-modeling techniques and operating systems; Multimedia systems and services; Security, privacy, and cryptographic protocols;10 KB (1,212 words) - 14:36, 29 December 2020
- |Title=Conference on Cryptographic Hardware and Embedded Systems Cryptographic implementations:3 KB (288 words) - 17:03, 7 April 2021
- ...ort for multimedia data; Multimedia data storage; Multimedia meta-modeling techniques and operating systems; Multimedia signal coding and processing (audio, vide ...tion,… ); Mobile multimedia systems and services; Security, privacy, and cryptographic protocols; Network security issues and protocols; Key management and authen10 KB (1,221 words) - 03:35, 3 December 2021