Search results

Jump to: navigation, search
Results 1 – 20 of 69
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  • * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 16:48, 14 October 2008
  • Techniques and Applications index distribution schemes, memory management techniques, etc.
    5 KB (644 words) - 22:10, 14 October 2008
  • ...Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, l * Cryptographic primitives for wireless communication
    2 KB (291 words) - 22:19, 14 October 2008
  • * Techniques and Tools for Formal Verification * game theoretic aspects of cryptographic protocols
    6 KB (682 words) - 09:18, 14 April 2020
  • ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;
    13 KB (1,617 words) - 18:03, 24 November 2008
  • Communications Techniques and Technologies * IF/RF Technologies and Techniques
    5 KB (526 words) - 00:02, 2 February 2009
  • * Cryptographic techniques and key management * Cryptographic hardware design
    16 KB (2,178 words) - 11:59, 18 January 2009
  • * Cryptographic protocols and key management in UCS * System/network management techniques and strategies in UE.
    6 KB (793 words) - 14:12, 1 October 2020
  • - applications of cryptographic techniques - techniques for developing secure systems
    12 KB (1,690 words) - 16:08, 27 February 2009
  •  Wireless Routing TechniquesCryptographic Algorithms and their Applications
    5 KB (578 words) - 09:21, 20 November 2020
  •  Wireless Routing TechniquesCryptographic Algorithms and their Applications
    5 KB (599 words) - 09:21, 20 November 2020
  • ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;
    6 KB (746 words) - 10:35, 2 August 2009
  • - Wireless Routing Techniques - Cryptographic Algorithms and their Applications
    5 KB (667 words) - 13:27, 13 September 2009
  • * Cryptographic techniques and key management * Cryptographic hardware design
    10 KB (1,270 words) - 16:12, 20 April 2010
  • * › Cryptographic Techniques and Key Management Area 3: Cryptographic Techniques and Key Management
    4 KB (409 words) - 14:40, 5 February 2010
  • - Cryptographic protocols and key management in UCS - System/network management techniques and strategies in UE.
    3 KB (498 words) - 01:52, 22 December 2012
  • * Attacks with novel insights, techniques, or results * Analysis of deployed cryptography and cryptographic protocols
    3 KB (343 words) - 15:31, 6 May 2020
  • ...representation, network management, network optimization, problem solution techniques, and so on), to communicate the network devices to transfer data between th ...unication layer. Algorithms and protocols based on artificial intelligence techniques for network management, network monitoring, quality of service enhancement,
    6 KB (833 words) - 14:16, 24 September 2020
  • *Novel cryptographic algorithms for VANETs *Secure and privacy‐preserving aggregation techniques for VANETs
    2 KB (233 words) - 05:32, 20 September 2016
  • |Field=Cryptographic Techniques
    244 bytes (29 words) - 13:16, 9 October 2016

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)