by
Dinur, Itai. editor.
Format:
Electronic Resources
Excerpt:
Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer
by
Kotsireas, Ilias S. editor.
Format:
Electronic Resources
Excerpt:
surfaces, applied algebraic geometry, cryptography, verified numerical computation, polynomial system
View Other Search Results
by
Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971
Format:
Electronic Resources
Excerpt:
Cryptography and Cryptanalysis -- Symmetric Key Cryptanalysis -- Theory -- Secure Computations and Protocols.
by
Nielsen, Jesper Buus. editor.
Format:
Electronic Resources
Excerpt:
; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cryptography. .
by
Kalajdziski, Slobodan. editor. (orcid)0000-0003-3373-8637
Format:
Electronic Resources
Excerpt:
cryptography, design and analysis of algorithms, mathematical optimization, probability and statistics, data
by
Capkun, Srdjan. editor.
Format:
Electronic Resources
Excerpt:
applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web
by
Kolhe, Mohan L. editor.
Format:
Electronic Resources
Excerpt:
Cryptography on Fractal Images -- Computer Aided Diagnosis of Melanoma Skin Cancer: A Review -- Computer Vision
by
Taniar, David.
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-960-1
Format:
Electronic Resources
Excerpt:
learning approach for one-stop learning / Marco Alvarez, SeungJin Lim -- 14. Using cryptography for
by
Zhong, Ning. editor.
Format:
Electronic Resources
Excerpt:
Data Mining to Medical Risk Management -- Using Cryptography for Privacy Protection in Data Mining
by
Wan, Jiafu. editor.
Format:
Electronic Resources
Excerpt:
-- Developing Visual Cryptography for Authentication on Smartphones -- A Scale-Free Network Model for Wireless
by
Alja’am, Jihad Mohamad. editor.
Format:
Electronic Resources
Excerpt:
satisfaction, cryptography and steganography, Fuzzy logic, soft computing, neural networks, artificial
by
Meersman, Robert. editor.
Format:
Electronic Resources
Excerpt:
-- Information Security (IS) 2007 International Symposium -- IS 2007 PC Co-chairs’ Message -- Cryptography: Past
Limit Search Results
Narrowed by: