Search results

Jump to: navigation, search
  • |Title=1st International Conference on Applied Cryptography and Network Security
    522 bytes (65 words) - 13:51, 6 November 2020
  • |Title=2nd International Conference on Applied Cryptography and Network Security
    535 bytes (66 words) - 14:23, 6 November 2020
  • |Title=3rd International Conference on Applied Cryptography and Network Security
    482 bytes (60 words) - 13:55, 6 November 2020
  • |Title=4th International Conference on Applied Cryptography and Network Security
    470 bytes (56 words) - 13:57, 6 November 2020
  • |Title=5th International Conference on Applied Cryptography and Network Security
    474 bytes (60 words) - 13:58, 6 November 2020
  • |Title=International Conference on Applied Cryptography and Network Security
    322 bytes (46 words) - 08:58, 13 February 2021
  • ...ta streams, social networks, databases, semantic web/; Privacy mechanisms /cryptography, privacy-aware access control, generalization-based algoritm, perturbation- Andreas Schmidt, Karlsruhe Institute of Technology / University of Applied Sciences, Germany
    11 KB (1,371 words) - 12:28, 18 May 2020
  • Topics of either theoretical or applied interest include, but are - language-based cryptography
    6 KB (788 words) - 23:01, 14 October 2008
  • Topics of either theoretical or applied interest include, but are not limited to: - language-based cryptography
    7 KB (994 words) - 23:06, 14 October 2008
  • 4-07 Applied cryptography
    5 KB (623 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security
    509 bytes (62 words) - 14:01, 6 November 2020
  • |Title=9th International Conference on Applied Cryptography and Network Security
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security
    507 bytes (62 words) - 14:09, 6 November 2020
  • applied cryptography intrusion detection data and application security
    5 KB (637 words) - 23:20, 14 October 2008
  • Applied Soft Computing Information Security and Cryptography
    3 KB (412 words) - 19:34, 12 November 2020
  • ..., devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clea ...of interest include, but are not limited to the following focus areas, as applied to mobile ICT:
    4 KB (451 words) - 23:37, 14 October 2008
  • * Applied Soft Computing * Information Security and Cryptography
    3 KB (386 words) - 23:39, 14 October 2008
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc * CRYPTO: Cryptography
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...ent original contributions on information technology security and privacy, applied or theoretical. More precisely, topics of this workshop include (but are no * Cryptography and cryptographic protocols.
    4 KB (506 words) - 17:07, 27 February 2009
  • - applied cryptography
    6 KB (828 words) - 17:08, 27 February 2009
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (578 words) - 10:21, 20 November 2020
  • and beyond to discuss hot topics in applied network and systems * Cryptography
    4 KB (530 words) - 15:02, 27 December 2015
  •  Authentication and Identification, Cryptography and Security Protocols  Visualization and Virtual Reality as Applied to Computational Science
    5 KB (599 words) - 10:21, 20 November 2020
  • Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc ...raphy; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems
    6 KB (746 words) - 11:35, 2 August 2009
  • - Authentication and Identification, Cryptography and Security Protocols - Visualization and Virtual Reality as Applied to Computational Science
    5 KB (667 words) - 14:27, 13 September 2009
  • - Cryptography - Applied e-Business
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=The 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies |Field=Communications, Biomedical, Applied sciences
    6 KB (758 words) - 18:02, 6 January 2010
  • - Cryptography - Applied e-Business
    6 KB (732 words) - 05:52, 5 December 2010
  • |Title=4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION TECHNOLOGIES |Field=Applied Sciences, Biotechnologies, ICT
    6 KB (776 words) - 18:20, 4 March 2011
  • − Information Security and Applied Cryptography.
    3 KB (367 words) - 16:37, 27 December 2015
  • and applied engineering and computer science subjects. The WCE conferences serve Cryptography
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - Cryptography - Applied e-Business
    5 KB (595 words) - 05:03, 15 January 2012
  • |Title=19th International Conference on Applied Cryptography and Network Security ...ference focusing on current developments that advance the areas of applied cryptography, cyber security (including network and computer security) and privacy.''
    870 bytes (109 words) - 19:16, 22 January 2021
  • .... The congress has the focus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCECS conferences serve as g Cryptography
    10 KB (1,308 words) - 09:20, 7 May 2012
  • |Field=applied cryptography
    2 KB (224 words) - 12:33, 22 May 2019
  • |Field=applied cryptography
    545 bytes (60 words) - 12:30, 10 March 2020
  • - Cryptography - Applied e-Business
    4 KB (535 words) - 14:38, 17 January 2013
  • * Applied Cryptography
    2 KB (264 words) - 15:32, 7 January 2021
  • - Cryptography - Applied e-Business
    5 KB (641 words) - 22:32, 29 July 2016
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • Applied Cryptography
    2 KB (308 words) - 11:50, 3 September 2017
  • Applied cryptography, Cryptanalysis, Digital Signatures Cryptography and cryptanalysis
    6 KB (743 words) - 11:45, 8 August 2017
  • |Field=applied cryptography *applied aspects of cryptography
    1 KB (176 words) - 15:19, 22 May 2019
  • |Field=applied cryptography ..., cryptanalysis of widely used standards, cryptographic protocols, quantum cryptography, and cryptographic currencies.
    1 KB (168 words) - 12:19, 24 May 2019
  • |Field=applied cryptography
    975 bytes (117 words) - 12:30, 24 May 2019
  • |Title=16th International Conference on Applied Cryptography and Network Security |Has coordinator=Computer Security and Industrial Cryptography (COSIC) group at KU Leuven
    687 bytes (85 words) - 14:17, 6 November 2020
  • |Title=17th International Conference on Applied Cryptography and Network Security
    712 bytes (89 words) - 14:18, 6 November 2020
  • |Title=18th International Conference on Applied Cryptography and Network Security
    923 bytes (110 words) - 14:21, 6 November 2020
  • * Applied cryptography
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics inc
    1 KB (152 words) - 10:13, 17 April 2020
  • 11th International Workshop on Coding and Cryptography This is the eleventh in the series of biannual work- shops Coding and Cryptography. It is organized by Université de Rennes 1, CNRS and DGA and will be held
    2 KB (220 words) - 12:57, 28 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics inc
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics inc
    1 KB (153 words) - 10:27, 17 April 2020
  • |Title=10th International Workshop on Coding and Cryptography 2017 ...tsoc.org/conferences/submit/the-tenth-international-workshop-on-coding-and-cryptography-2017
    641 bytes (83 words) - 13:23, 28 April 2020
  • Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functions; Specification, validation design of
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...security; Systems and network security; Security and cryptography; Applied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pse Peter Kieseberg, St. Pölten University of Applied Sciences, Austria
    18 KB (2,036 words) - 02:36, 10 July 2020
  • Cryptography; Encryption schemes; Cryptanalysis; Thrifty zero-knowledge approaches; Chao Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillanc
    15 KB (1,886 words) - 16:16, 25 August 2020
  • * Applied cryptography
    4 KB (436 words) - 12:06, 25 August 2020
  • Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functions; Specification,
    13 KB (1,607 words) - 19:32, 30 November 2020
  • * • Applied Cryptography * • Public Key Cryptography
    2 KB (197 words) - 17:40, 11 February 2021
  • | {{OR|ACNS}} || International Conference on Applied Cryptography and Network Security || http://www.wikidata.org/entity/Q4781524 | CSS || International Conference on Cryptography and Security Systems || https://www.wikidata.org/entity/Q47482923
    19 KB (2,518 words) - 09:03, 21 February 2021