Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Ergodic theory. Information theory --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- coderen --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- grafische vormgeving --- informatica --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
Offers an overview of the state-of-the-art in identity-based cryptography.
Choose an application
681.3*D46 <043> --- Academic collection --- #BIBC:T2004 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)--Dissertaties --- Theses --- 681.3*D46 <043> Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)--Dissertaties
Choose an application
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.
Ergodic theory. Information theory --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- coderen --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- grafische vormgeving --- informatica --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
Choose an application
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.
Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Data protection --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Computer science --- Computer graphics. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Discrete Mathematics in Computer Science. --- Coding and Information Theory. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Mathematics. --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Computer mathematics --- Discrete mathematics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Digital techniques --- Mathematics --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Computer vision. --- Cryptology. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Complexity, Computational --- Computer science—Mathematics. --- Information theory. --- Optical data processing. --- Communication theory --- Communication --- Cybernetics --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment
Listing 1 - 6 of 6 |
Sort by
|