Search results

Jump to: navigation, search
  • |Field=Cryptographic Techniques
    287 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    273 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    284 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    273 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    250 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    256 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    263 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    289 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    252 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    252 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    274 bytes (32 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    251 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    261 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    284 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    244 bytes (29 words) - 13:16, 9 October 2016
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques
    376 bytes (39 words) - 13:43, 9 April 2021
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    263 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    255 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    266 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    254 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    259 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    260 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    145 bytes (16 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    258 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    288 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    264 bytes (28 words) - 13:16, 9 October 2016
  • techniques; satisfiability modulo theories; combinations of logics and deductive and hash-based cryptographic primitives; algebraic cryptanalysis, algebraic
    5 KB (670 words) - 12:24, 28 July 2017
  • exchange and dissemination of new ideas, techniques and research in Cryptographic Protocols
    3 KB (347 words) - 18:48, 22 November 2017
  • -Cryptographic protocols against insider threats -Data breach modeling and mitigation techniques
    5 KB (611 words) - 10:47, 8 August 2017
  • particular, novel techniques and mechanisms aimed at the security and privacy Papers with a strong cryptographic background will not be considered as part of
    4 KB (547 words) - 08:58, 21 August 2017
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques ...widely used standards, cryptographic protocols, quantum cryptography, and cryptographic currencies.
    1 KB (168 words) - 11:19, 24 May 2019
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques
    975 bytes (117 words) - 11:30, 24 May 2019
  • ...analysis. On the one hand, provable security provides confidence in using cryptographic schemes and protocols for various real-world applications, but on the other All aspects of provable security in constructing and analyzing cryptographic primitives, including but are not limited to:
    3 KB (445 words) - 10:59, 9 April 2020
  • ...ers; Performance optimization for NFV; SDN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity ...security and privacy in Internet of Things; Lightweight implementations of cryptographic stacks; Experiences with Open Platforms and hardware within Internet of Thi
    13 KB (1,550 words) - 01:20, 10 July 2020
  • ...nature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometr Intelligent techniques, logics, and systems
    18 KB (2,036 words) - 01:36, 10 July 2020
  • ...ng technologies and methods; Sealed-bid auctions; Trusted smart contracts; Cryptographic Web applications; Real estate: titles&tokens ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to
    15 KB (1,886 words) - 15:16, 25 August 2020
  • 5G Edge caching techniques; Performance in 5G networks; Security and implementations of cryptographic stacks; Experiences with Open
    13 KB (1,607 words) - 18:32, 30 November 2020
  • Multimedia meta-modeling techniques and operating systems; Multimedia systems and services; Security, privacy, and cryptographic protocols;
    10 KB (1,212 words) - 13:36, 29 December 2020
  • |Title=Conference on Cryptographic Hardware and Embedded Systems Cryptographic implementations:
    3 KB (288 words) - 16:03, 7 April 2021
  • ...ort for multimedia data; Multimedia data storage; Multimedia meta-modeling techniques and operating systems; Multimedia signal coding and processing (audio, vide ...tion,… ); Mobile multimedia systems and services; Security, privacy, and cryptographic protocols; Network security issues and protocols; Key management and authen
    10 KB (1,221 words) - 02:35, 3 December 2021

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)