Search results

Jump to: navigation, search
  • * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 16:48, 14 October 2008
  • Techniques and Applications index distribution schemes, memory management techniques, etc.
    5 KB (644 words) - 22:10, 14 October 2008
  • ...Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, l * Cryptographic primitives for wireless communication
    2 KB (291 words) - 22:19, 14 October 2008
  • * Techniques and Tools for Formal Verification * game theoretic aspects of cryptographic protocols
    6 KB (682 words) - 09:18, 14 April 2020
  • ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;
    13 KB (1,617 words) - 18:03, 24 November 2008
  • Communications Techniques and Technologies * IF/RF Technologies and Techniques
    5 KB (526 words) - 00:02, 2 February 2009
  • * Cryptographic techniques and key management * Cryptographic hardware design
    16 KB (2,178 words) - 11:59, 18 January 2009
  • * Cryptographic protocols and key management in UCS * System/network management techniques and strategies in UE.
    6 KB (793 words) - 14:12, 1 October 2020
  • - applications of cryptographic techniques - techniques for developing secure systems
    12 KB (1,690 words) - 16:08, 27 February 2009
  •  Wireless Routing TechniquesCryptographic Algorithms and their Applications
    5 KB (578 words) - 09:21, 20 November 2020
  •  Wireless Routing TechniquesCryptographic Algorithms and their Applications
    5 KB (599 words) - 09:21, 20 November 2020
  • ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;
    6 KB (746 words) - 10:35, 2 August 2009
  • - Wireless Routing Techniques - Cryptographic Algorithms and their Applications
    5 KB (667 words) - 13:27, 13 September 2009
  • * Cryptographic techniques and key management * Cryptographic hardware design
    10 KB (1,270 words) - 16:12, 20 April 2010
  • * › Cryptographic Techniques and Key Management Area 3: Cryptographic Techniques and Key Management
    4 KB (409 words) - 14:40, 5 February 2010
  • - Cryptographic protocols and key management in UCS - System/network management techniques and strategies in UE.
    3 KB (498 words) - 01:52, 22 December 2012
  • * Attacks with novel insights, techniques, or results * Analysis of deployed cryptography and cryptographic protocols
    3 KB (343 words) - 15:31, 6 May 2020
  • ...representation, network management, network optimization, problem solution techniques, and so on), to communicate the network devices to transfer data between th ...unication layer. Algorithms and protocols based on artificial intelligence techniques for network management, network monitoring, quality of service enhancement,
    6 KB (833 words) - 14:16, 24 September 2020
  • *Novel cryptographic algorithms for VANETs *Secure and privacy‐preserving aggregation techniques for VANETs
    2 KB (233 words) - 05:32, 20 September 2016
  • |Field=Cryptographic Techniques
    244 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    287 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    273 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    284 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    273 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    250 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    256 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    263 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    289 bytes (33 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    252 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    252 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    274 bytes (32 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    251 bytes (27 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    261 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    284 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    270 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    244 bytes (29 words) - 13:16, 9 October 2016
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques
    376 bytes (39 words) - 13:43, 9 April 2021
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    263 bytes (31 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    255 bytes (30 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    266 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    254 bytes (29 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    259 bytes (28 words) - 13:16, 9 October 2016
  • |Field=Cryptographic Techniques
    260 bytes (28 words) - 13:16, 9 October 2016

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)