Search results
Create the page "Applied cryptography" on this wiki! See also the search results found.
- |Title=1st International Conference on Applied Cryptography and Network Security522 bytes (65 words) - 13:51, 6 November 2020
- |Title=2nd International Conference on Applied Cryptography and Network Security535 bytes (66 words) - 14:23, 6 November 2020
- |Title=3rd International Conference on Applied Cryptography and Network Security482 bytes (60 words) - 13:55, 6 November 2020
- |Title=4th International Conference on Applied Cryptography and Network Security470 bytes (56 words) - 13:57, 6 November 2020
- |Title=5th International Conference on Applied Cryptography and Network Security474 bytes (60 words) - 13:58, 6 November 2020
- |Title=International Conference on Applied Cryptography and Network Security322 bytes (46 words) - 08:58, 13 February 2021
- ...ta streams, social networks, databases, semantic web/; Privacy mechanisms /cryptography, privacy-aware access control, generalization-based algoritm, perturbation- Andreas Schmidt, Karlsruhe Institute of Technology / University of Applied Sciences, Germany11 KB (1,371 words) - 12:28, 18 May 2020
- Topics of either theoretical or applied interest include, but are - language-based cryptography6 KB (788 words) - 23:01, 14 October 2008
- Topics of either theoretical or applied interest include, but are not limited to: - language-based cryptography7 KB (994 words) - 23:06, 14 October 2008
- 4-07 Applied cryptography5 KB (623 words) - 23:15, 14 October 2008
- |Title=6th International Conference on Applied Cryptography and Network Security509 bytes (65 words) - 14:00, 6 November 2020
- |Title=7th International Conference on Applied Cryptography and Network Security509 bytes (62 words) - 14:01, 6 November 2020
- |Title=9th International Conference on Applied Cryptography and Network Security496 bytes (63 words) - 14:05, 6 November 2020
- |Title=15th International Conference on Applied Cryptography and Network Security506 bytes (61 words) - 14:16, 6 November 2020
- |Title=8th International Conference on Applied Cryptography and Network Security475 bytes (60 words) - 14:03, 6 November 2020
- |Title=14th International Conference on Applied Cryptography and Network Security485 bytes (60 words) - 14:15, 6 November 2020
- |Title=12th International Conference on Applied Cryptography and Network Security497 bytes (60 words) - 14:11, 6 November 2020
- |Title=13th International Conference on Applied Cryptography and Network Security516 bytes (64 words) - 14:12, 6 November 2020
- |Title=10th International Conference on Applied Cryptography and Network Security491 bytes (60 words) - 14:07, 6 November 2020
- |Title=11th International Conference on Applied Cryptography and Network Security507 bytes (62 words) - 14:09, 6 November 2020
- applied cryptography intrusion detection data and application security5 KB (637 words) - 23:20, 14 October 2008
- Applied Soft Computing Information Security and Cryptography3 KB (412 words) - 19:34, 12 November 2020
- ..., devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clea ...of interest include, but are not limited to the following focus areas, as applied to mobile ICT:4 KB (451 words) - 23:37, 14 October 2008
- * Applied Soft Computing * Information Security and Cryptography3 KB (386 words) - 23:39, 14 October 2008
- Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc * CRYPTO: Cryptography13 KB (1,617 words) - 19:03, 24 November 2008
- ...ent original contributions on information technology security and privacy, applied or theoretical. More precisely, topics of this workshop include (but are no * Cryptography and cryptographic protocols.4 KB (506 words) - 17:07, 27 February 2009
- - applied cryptography6 KB (828 words) - 17:08, 27 February 2009
- Authentication and Identification, Cryptography and Security Protocols Visualization and Virtual Reality as Applied to Computational Science5 KB (578 words) - 10:21, 20 November 2020
- and beyond to discuss hot topics in applied network and systems * Cryptography4 KB (530 words) - 15:02, 27 December 2015
- Authentication and Identification, Cryptography and Security Protocols Visualization and Virtual Reality as Applied to Computational Science5 KB (599 words) - 10:21, 20 November 2020
- Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc ...raphy; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems6 KB (746 words) - 11:35, 2 August 2009
- - Authentication and Identification, Cryptography and Security Protocols - Visualization and Virtual Reality as Applied to Computational Science5 KB (667 words) - 14:27, 13 September 2009
- - Cryptography - Applied e-Business4 KB (507 words) - 22:37, 18 November 2009
- |Title=The 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies |Field=Communications, Biomedical, Applied sciences6 KB (758 words) - 18:02, 6 January 2010
- ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno Cryptography and Foundation of Computer Security6 KB (670 words) - 12:28, 10 January 2010
- ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno * Cryptography and Foundation of Computer Security6 KB (704 words) - 13:01, 27 March 2020
- - Cryptography - Applied e-Business6 KB (732 words) - 05:52, 5 December 2010
- |Title=4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION TECHNOLOGIES |Field=Applied Sciences, Biotechnologies, ICT6 KB (776 words) - 18:20, 4 March 2011
- − Information Security and Applied Cryptography.3 KB (367 words) - 16:37, 27 December 2015
- and applied engineering and computer science subjects. The WCE conferences serve Cryptography8 KB (1,085 words) - 16:28, 6 February 2012
- - Cryptography - Applied e-Business5 KB (595 words) - 05:03, 15 January 2012
- |Title=19th International Conference on Applied Cryptography and Network Security ...ference focusing on current developments that advance the areas of applied cryptography, cyber security (including network and computer security) and privacy.''870 bytes (109 words) - 19:16, 22 January 2021
- .... The congress has the focus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCECS conferences serve as g Cryptography10 KB (1,308 words) - 09:20, 7 May 2012
- |Field=applied cryptography2 KB (224 words) - 12:33, 22 May 2019
- |Field=applied cryptography545 bytes (60 words) - 12:30, 10 March 2020
- - Cryptography - Applied e-Business4 KB (535 words) - 14:38, 17 January 2013
- * Applied Cryptography2 KB (264 words) - 15:32, 7 January 2021
- - Cryptography - Applied e-Business5 KB (641 words) - 22:32, 29 July 2016
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- Applied Cryptography2 KB (308 words) - 11:50, 3 September 2017