by
Lam, Kwok-Yan. editor.
Format:
Electronic Resources
Excerpt:
papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour
by
Qing, Sihan. editor.
Format:
Electronic Resources
Excerpt:
; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications
View Other Search Results
by
Naccache, David. editor. (orcid)0000-0002-8651-6555
Format:
Electronic Resources
Excerpt:
encryption and identity-based cryptography, verifiable storage and computing, applied cryptography
by
Qing, Sihan. editor.
Format:
Electronic Resources
Excerpt:
and Secure Design of Masked AES S-Box -- Applied Cryptography -- Boudot’s Range-Bounded Commitment
by
Qing, Sihan. editor.
Format:
Electronic Resources
Excerpt:
Through Vulnerability Take-Grant Model (VTG) -- Applied Cryptography -- Multiplex Encryption: A Practical
by
Ning, Peng. editor.
Format:
Electronic Resources
Excerpt:
Cryptography and Network Security -- Secure Set Membership Using 3Sat -- Left-to-Right Signed-Bit ?-Adic
Limit Search Results
Narrowed by: