खोज परिणाम - "cryptographer"
प्रस्तावित विषय : खोज निहित
प्रस्तावित विषय : खोज निहित
- Computer science 5
- Computer security 4
- Computing & information technology 4
- Finance 4
- Applied mathematics 3
- Data and Information Security 3
- Data protection 3
- Macroeconomics 3
- Mathematics 3
- Coding theory & cryptology 2
- Electrical engineering 2
- Ethical issues & debates 2
- Financial Technology and Innovation 2
- Financial engineering 2
- Information technology industries 2
- Mathematical theory of computation 2
- Security & fire alarm systems 2
- Sociology 2
- Aerospace & aviation technology 1
- Algebra 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Blockchain 1
- Blockchains (Databases) 1
- Capital Markets 1
- Capital market 1
- Computer Modelling 1
- Computer Science Logic and Foundations of Programming 1
- Computer networking & communications 1
- Computer simulation 1
-
1
Cryptographic City Decoding the Smart Metropolis
प्रकाशित 2023DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
2
The Cryptographic Imagination Secret Writing from Edgar Poe to the Internet
प्रकाशित 2020DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
3
Lightweight Cryptographic Techniques and Cybersecurity Approaches
प्रकाशित 2022DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
4
-
5
-
6
-
7
-
8
Optimization and Applications of Modern Wireless Networks and Symmetry
प्रकाशित 2022विषय: “…symmetric cryptographic primitives…”
DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
9
Side Channel Attacks
प्रकाशित 2019विषय: “…cryptographic keys…”
DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
10
Data Hiding and Its Applications Digital Watermarking and Steganography
प्रकाशित 2022विषय: “…cryptographic hash function…”
DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
11
Variant Construction from Theoretical Foundation to Applications
प्रकाशित 2019विषय - सूची: “…Introduction -- Variant Logic -- Variant Measurement -- Variant Map -- Variation with Global Functions -- Variant Stream Ciphers -- Quantum Interferences -- Classical/Quantum Cryptographic Sequences -- Whole DNA Sequences -- Multiple Valued Pulse Sequences -- Conclusion -- Bibliography -- Index.…”
Link to Metadata
इलेक्ट्रोनिक ई-पुस्तक -
12
Security of Ubiquitous Computing Systems Selected Topics /
प्रकाशित 2021विषय - सूची: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
इलेक्ट्रोनिक ई-पुस्तक -
13
Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessalonik...
प्रकाशित 2018विषय - सूची: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
Link to Metadata
इलेक्ट्रोनिक ई-पुस्तक -
14
Computer Aided Verification 33rd International Conference, CAV 2021, Virtual Event, July 20-23, 2021, Proceedings, Part I /
प्रकाशित 2021विषय - सूची: “…-- Checking Data-Race Freedom of GPU Kernels, Compositionally -- GenMC: A Model Checker for Weak Memory Models -- Hybrid and Cyber-Physical Systems -- Synthesizing Invariant Barrier Certificates via Difference-of-Convex Programming -- An Iterative Scheme of Safe Reinforcement Learning for Nonlinear Systems via Barrier Certificate Generation -- HybridSynchAADL: Modeling and Formal Analysis of Virtually Synchronous CPSs in AADL -- Computing Bottom SCCs Symbolically Using Transition Guided Reduction -- Implicit Semi-Algebraic Abstraction for Polynomial Dynamical Systems -- IMITATOR 3: Synthesis of timing parameters beyond decidability -- Formally Verified Switching Logic for Recoverability of Aircraft Controller -- SceneChecker: Boosting Scenario Verification using Symmetry Abstractions -- Effective Hybrid System Falsification Using Monte Carlo Tree Search Guided by QB-Robustness -- Fast zone-based algorithms for reachability in pushdown timed automata -- Security -- Verified Cryptographic Code for Everybody -- Not All Bugs Are Created Equal, But Robust Reachability Can Tell The Difference -- A Temporal Logic for Asynchronous Hyperproperties -- Product Programs in the Wild: Retrofitting Program Verifiers to Check Information Flow Security -- Constraint-based Relational Verification -- Pre-Deployment Security Assessment for Cloud Services through Semantic Reasoning -- Synthesis -- Synthesis with Asymptotic Resource Bounds -- Program Sketching by Automatically Generating Mocks from Tests -- Counterexample-Guided Partial Bounding for Recursive Function Synthesis -- PAYNT: A Tool for Inductive Synthesis of Probabilistic Programs -- Adapting Behaviors via Reactive Synthesis -- Causality-based Game Solving.…”
Link to Metadata
इलेक्ट्रोनिक ई-पुस्तक -
15
Interactions between Group Theory, Symmetry and Cryptology
प्रकाशित 2020DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
16
Review on Cryptography Techniques in Network Security
प्रकाशित 2021Connect to this object online.
पुस्तक -
17
-
18
-
19
Modern Cryptography Volume 1 A Classical Introduction to Informational and Mathematical Principle
प्रकाशित 2022DOAB: download the publication
DOAB: description of the publication
इलेक्ट्रोनिक पुस्तक अध्याय -
20
Modern Cryptography Volume 1 A Classical Introduction to Informational and Mathematical Principle /
प्रकाशित 2022Link to Metadata
इलेक्ट्रोनिक ई-पुस्तक