खोज परिणाम - "cryptographer"

  1. 1

    Cryptographic City Decoding the Smart Metropolis द्वारा Coyne, Richard

    प्रकाशित 2023
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  2. 2

    The Cryptographic Imagination Secret Writing from Edgar Poe to the Internet द्वारा Rosenheim, Shawn James

    प्रकाशित 2020
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  3. 3

    Lightweight Cryptographic Techniques and Cybersecurity Approaches

    प्रकाशित 2022
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  4. 4

    THE TABULAR OF CRYPTOGRAPHIC PRIMITIVES OF NONLINEAR SUBSTITUTIONS द्वारा A. Beletsky

    प्रकाशित 2015
    Connect to this object online.
    पुस्तक
  5. 5

    COMPUTER ANIMATION OF CRYPTOGRAPHIC ALGORITHMS BASED ON FLASH-TECHNOLOGY AS TOOL FOR PRESENTATION EDUCATIONAL LECTURE MATERIAL द्वारा Natalia Zagatska

    प्रकाशित 2017
    Connect to this object online.
    पुस्तक
  6. 6
  7. 7
  8. 8

    Optimization and Applications of Modern Wireless Networks and Symmetry

    प्रकाशित 2022
    विषय: “…symmetric cryptographic primitives…”
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  9. 9

    Side Channel Attacks द्वारा Hong, Seokhie

    प्रकाशित 2019
    विषय: “…cryptographic keys…”
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  10. 10

    Data Hiding and Its Applications Digital Watermarking and Steganography

    प्रकाशित 2022
    विषय: “…cryptographic hash function…”
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  11. 11

    Variant Construction from Theoretical Foundation to Applications

    प्रकाशित 2019
    विषय - सूची: “…Introduction -- Variant Logic -- Variant Measurement -- Variant Map -- Variation with Global Functions -- Variant Stream Ciphers -- Quantum Interferences -- Classical/Quantum Cryptographic Sequences -- Whole DNA Sequences -- Multiple Valued Pulse Sequences -- Conclusion -- Bibliography -- Index.…”
    Link to Metadata
    इलेक्ट्रोनिक ई-पुस्तक
  12. 12

    Security of Ubiquitous Computing Systems Selected Topics /

    प्रकाशित 2021
    विषय - सूची: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
    Link to Metadata
    इलेक्ट्रोनिक ई-पुस्तक
  13. 13

    Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessalonik...

    प्रकाशित 2018
    विषय - सूची: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
    Link to Metadata
    इलेक्ट्रोनिक ई-पुस्तक
  14. 14

    Computer Aided Verification 33rd International Conference, CAV 2021, Virtual Event, July 20-23, 2021, Proceedings, Part I /

    प्रकाशित 2021
    विषय - सूची: “…-- Checking Data-Race Freedom of GPU Kernels, Compositionally -- GenMC: A Model Checker for Weak Memory Models -- Hybrid and Cyber-Physical Systems -- Synthesizing Invariant Barrier Certificates via Difference-of-Convex Programming -- An Iterative Scheme of Safe Reinforcement Learning for Nonlinear Systems via Barrier Certificate Generation -- HybridSynchAADL: Modeling and Formal Analysis of Virtually Synchronous CPSs in AADL -- Computing Bottom SCCs Symbolically Using Transition Guided Reduction -- Implicit Semi-Algebraic Abstraction for Polynomial Dynamical Systems -- IMITATOR 3: Synthesis of timing parameters beyond decidability -- Formally Verified Switching Logic for Recoverability of Aircraft Controller -- SceneChecker: Boosting Scenario Verification using Symmetry Abstractions -- Effective Hybrid System Falsification Using Monte Carlo Tree Search Guided by QB-Robustness -- Fast zone-based algorithms for reachability in pushdown timed automata -- Security -- Verified Cryptographic Code for Everybody -- Not All Bugs Are Created Equal, But Robust Reachability Can Tell The Difference -- A Temporal Logic for Asynchronous Hyperproperties -- Product Programs in the Wild: Retrofitting Program Verifiers to Check Information Flow Security -- Constraint-based Relational Verification -- Pre-Deployment Security Assessment for Cloud Services through Semantic Reasoning -- Synthesis -- Synthesis with Asymptotic Resource Bounds -- Program Sketching by Automatically Generating Mocks from Tests -- Counterexample-Guided Partial Bounding for Recursive Function Synthesis -- PAYNT: A Tool for Inductive Synthesis of Probabilistic Programs -- Adapting Behaviors via Reactive Synthesis -- Causality-based Game Solving.…”
    Link to Metadata
    इलेक्ट्रोनिक ई-पुस्तक
  15. 15

    Interactions between Group Theory, Symmetry and Cryptology द्वारा González Vasco, María Isabel

    प्रकाशित 2020
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  16. 16

    Review on Cryptography Techniques in Network Security द्वारा Angela Gan

    प्रकाशित 2021
    Connect to this object online.
    पुस्तक
  17. 17

    THE FOUNDATIONS OF CONCEPTUAL AND TERMINOLOGICAL APPARATUS OF CRYPTOLOGY द्वारा N. Zagatska

    प्रकाशित 2014
    Connect to this object online.
    पुस्तक
  18. 18

    A comparative Study to calculate the Runs Property in the encryption systems द्वारा ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن

    प्रकाशित 2019
    Connect to this object online.
    पुस्तक
  19. 19

    Modern Cryptography Volume 1 A Classical Introduction to Informational and Mathematical Principle द्वारा Zheng, Zhiyong

    प्रकाशित 2022
    DOAB: download the publication
    DOAB: description of the publication
    इलेक्ट्रोनिक पुस्तक अध्याय
  20. 20

    Modern Cryptography Volume 1 A Classical Introduction to Informational and Mathematical Principle / द्वारा Zheng, Zhiyong

    प्रकाशित 2022
    Link to Metadata
    इलेक्ट्रोनिक ई-पुस्तक