Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Periodicals --- Isecure --- Information --- security --- cryptology --- Cryptography --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- isecure --- information
Choose an application
block cipher --- implementation --- symmetric cryptology --- stream cipher --- hash function --- cryptanalysis --- Cryptography --- Ciphers
Choose an application
Mathematical Sciences --- Applied Mathematics --- mathematical cryptology --- information security --- theory of cryptology --- quantum cryptology --- algebraic geometry --- coding theory --- Coding theory --- Cryptography --- Mathematics --- Mathematics. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
Group theory --- Computational complexity --- Cryptography --- Computational complexity. --- Group theory. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Complexity, Computational --- Electronic data processing --- Machine theory --- Groups, Theory of --- Substitutions (Mathematics) --- Algebra --- Mathematics --- Mathematics. --- combinatorial group theory --- computational group theory --- algorithms --- complexity theory --- cryptology --- information security
Choose an application
cryptanalysis --- secret-key cryptography --- cryptographic protocols --- secure smart system/device --- digital rights management --- quantum safe cryptography --- Data encryption (Computer science) --- Cryptography --- Cryptography. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer Science --- Engineering sciences. Technology
Choose an application
The fully open access Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security. The journal is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the human aspects of cybersecurity. Journal of Cybersecurity provides a hub around which the interdisciplinary cybersecurity community can form, and is committed to providing quality conceptual and empirical research, as well as scholarship, that is grounded in real-world implications and solutions.
Internet --- Security measures --- Periodicals --- Sécurité --- Mesures --- Périodiques --- Computer security --- Cryptography --- Computer science --- Computer science. --- Computer security. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Informatics --- security --- cryptography --- cybersecurity --- information security --- privacy --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data protection --- Security systems --- Hacking --- Science --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Sécurité informatique --- Cryptographie --- Informatique
Choose an application
cryptographic implementations --- cryptographic implementations attacks --- cryptographic attack countermeasures --- cryptographic tools and methodologies --- cryptographic implementation issues --- cryptographic applications --- Embedded computer systems --- Cryptography --- Computer security --- Computer security. --- Cryptography. --- Embedded computer systems. --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Computer security --- Computers --- Computer networks --- Computer security. --- Computer & Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Access control --- Security measures --- Security measures. --- Access control. --- Protection --- Distributed processing --- Computer. Automation --- cryptology --- network security --- cyber security --- coding theory --- information security
Choose an application
Computer networks --- Computer security --- Cryptography --- Computer security. --- Cryptography. --- Security measures --- Security measures. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- security systems --- security network --- secured communications --- cryptography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Cyber security --- Cybersecurity --- Engineering --- Electrical Engineering --- Protection of computer systems --- Protection --- Science --- Engineering sciences. Technology
Listing 1 - 9 of 9 |
Sort by
|