Search results

Jump to: navigation, search
  • |Title=1st International Conference on Applied Cryptography and Network Security
    522 bytes (65 words) - 13:51, 6 November 2020
  • |Title=2nd International Conference on Applied Cryptography and Network Security
    535 bytes (66 words) - 14:23, 6 November 2020
  • |Title=3rd International Conference on Applied Cryptography and Network Security
    482 bytes (60 words) - 13:55, 6 November 2020
  • |Title=4th International Conference on Applied Cryptography and Network Security
    470 bytes (56 words) - 13:57, 6 November 2020
  • |Title=5th International Conference on Applied Cryptography and Network Security
    474 bytes (60 words) - 13:58, 6 November 2020
  • |Title=International Conference on Applied Cryptography and Network Security
    322 bytes (46 words) - 08:58, 13 February 2021
  • ...ta streams, social networks, databases, semantic web/; Privacy mechanisms /cryptography, privacy-aware access control, generalization-based algoritm, perturbation- Andreas Schmidt, Karlsruhe Institute of Technology / University of Applied Sciences, Germany
    11 KB (1,371 words) - 12:28, 18 May 2020
  • Topics of either theoretical or applied interest include, but are - language-based cryptography
    6 KB (788 words) - 23:01, 14 October 2008
  • Topics of either theoretical or applied interest include, but are not limited to: - language-based cryptography
    7 KB (994 words) - 23:06, 14 October 2008
  • 4-07 Applied cryptography
    5 KB (623 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security
    509 bytes (62 words) - 14:01, 6 November 2020
  • |Title=9th International Conference on Applied Cryptography and Network Security
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security
    507 bytes (62 words) - 14:09, 6 November 2020
  • applied cryptography intrusion detection data and application security
    5 KB (637 words) - 23:20, 14 October 2008
  • Applied Soft Computing Information Security and Cryptography
    3 KB (412 words) - 19:34, 12 November 2020
  • ..., devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clea ...of interest include, but are not limited to the following focus areas, as applied to mobile ICT:
    4 KB (451 words) - 23:37, 14 October 2008
  • * Applied Soft Computing * Information Security and Cryptography
    3 KB (386 words) - 23:39, 14 October 2008
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc * CRYPTO: Cryptography
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...ent original contributions on information technology security and privacy, applied or theoretical. More precisely, topics of this workshop include (but are no * Cryptography and cryptographic protocols.
    4 KB (506 words) - 17:07, 27 February 2009
  • - applied cryptography
    6 KB (828 words) - 17:08, 27 February 2009
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (578 words) - 10:21, 20 November 2020
  • and beyond to discuss hot topics in applied network and systems * Cryptography
    4 KB (530 words) - 15:02, 27 December 2015
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (599 words) - 10:21, 20 November 2020
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc ...raphy; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems
    6 KB (746 words) - 11:35, 2 August 2009
  • - Authentication and Identification, Cryptography and Security Protocols - Visualization and Virtual Reality as Applied to Computational Science
    5 KB (667 words) - 14:27, 13 September 2009
  • - Cryptography - Applied e-Business
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=The 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies |Field=Communications, Biomedical, Applied sciences
    6 KB (758 words) - 18:02, 6 January 2010
  • ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno Cryptography and Foundation of Computer Security
    6 KB (670 words) - 12:28, 10 January 2010
  • ...ances and research results in the fields of theoretical, experimental, and applied electronics, computer science, communication network and Information techno * Cryptography and Foundation of Computer Security
    6 KB (704 words) - 13:01, 27 March 2020
  • - Cryptography - Applied e-Business
    6 KB (732 words) - 05:52, 5 December 2010
  • |Title=4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION TECHNOLOGIES |Field=Applied Sciences, Biotechnologies, ICT
    6 KB (776 words) - 18:20, 4 March 2011
  • − Information Security and Applied Cryptography.
    3 KB (367 words) - 16:37, 27 December 2015
  • and applied engineering and computer science subjects. The WCE conferences serve Cryptography
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - Cryptography - Applied e-Business
    5 KB (595 words) - 05:03, 15 January 2012
  • |Title=19th International Conference on Applied Cryptography and Network Security ...ference focusing on current developments that advance the areas of applied cryptography, cyber security (including network and computer security) and privacy.''
    870 bytes (109 words) - 19:16, 22 January 2021
  • .... The congress has the focus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCECS conferences serve as g Cryptography
    10 KB (1,308 words) - 09:20, 7 May 2012
  • |Field=applied cryptography
    2 KB (224 words) - 12:33, 22 May 2019
  • |Field=applied cryptography
    545 bytes (60 words) - 12:30, 10 March 2020
  • - Cryptography - Applied e-Business
    4 KB (535 words) - 14:38, 17 January 2013
  • * Applied Cryptography
    2 KB (264 words) - 15:32, 7 January 2021
  • - Cryptography - Applied e-Business
    5 KB (641 words) - 22:32, 29 July 2016
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • Applied Cryptography
    2 KB (308 words) - 11:50, 3 September 2017

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)