by
Beimel, Amos. editor.
Format:
Electronic Resources
Excerpt:
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018
by
Beimel, Amos. editor.
Format:
Electronic Resources
Excerpt:
Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018
View Other Search Results
by
Preneel, Bart. editor. (orcid)0000-0003-2005-9651
Format:
Electronic Resources
Excerpt:
Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium
by
Castiglione, Arcangelo. editor.
Format:
Electronic Resources
Excerpt:
; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.
by
Susilo, Willy. editor. (orcid)0000-0002-1562-5105
Format:
Electronic Resources
Excerpt:
topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security
by
Qing, Sihan. editor.
Format:
Electronic Resources
Excerpt:
; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications
by
Susilo, Willy. editor.
Format:
Electronic Resources
Excerpt:
Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge
by
Blyth, Andrew. author.
Format:
Electronic Resources
Excerpt:
Cryptography Network Discovery and Mapping Network Security Intrusion Detection Systems Incident Response and
by
Gruschka, Nils. editor. (orcid)0000-0001-7360-8314
Format:
Electronic Resources
Excerpt:
; cryptography; network and cloud security; cyber security and malware; and security for software and software
by
Blyth, Andrew. author.
Format:
Electronic Resources
Excerpt:
; - Cryptography; - International standards, policies and security acts. A refreshingly clear and wide-ranging view
by
Au, Man Ho. editor. (orcid)0000-0003-2068-9530
Format:
Electronic Resources
Excerpt:
wide range of topics in the field, including blockchain, mobile security, applied cryptography
by
Blyth, Andrew. editor.
Format:
Electronic Resources
Excerpt:
Security Cryptography Network Discovery and Mapping Network Security Intrusion Detection Systems Incident
Limit Search Results
Narrowed by: