Daras 2 nd International Conference on Cryptography , Network Security and Applications in the Armed Forces Hellenic Military Academy April 2 , 2014

نویسنده

  • Nicholas J. Daras
چکیده

Editor: Nicholas J. Daras 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces Hellenic Military Academy

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fractal Dimension as an Assessment Metric for Pseudorandom Number Generators

Editor: Nicholas J. Daras 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces Hellenic Military Academy

متن کامل

Armed Forces of the Persian Gulf Countries

The armed forces and the army are main elements of national power. Military readiness gives real significance to the geography, natural resources, and industrial power. Military elements of national power include military purposes, military doctrines, military strategies and policies (defensive and non-defensive), forces, training, command, military technology, weapons and equipment, military o...

متن کامل

Describing the Role and Duties of a Military Pharmacist in Iran Armed Forces Health Care System

Background and Aim: Due to the comprehensiveness of educational topics and mastery of various scientific topics, including mathematics, physics, chemistry, and biology on the one hand, and management, business and economics on the other, pharmacists have a significant ability to perform various tasks in the healthcare system. In the meantime, pharmacists who are exposed to military training, as...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings

information security practice and experience 10th international conference ispec 2014 fuzhou china may 5-8 2014 proceedings lecture notes in computer science security and cryptology PDF advances in cryptology-asiacrypt 96 international conference on the theory and applications of crypotology and information security kyongju lecture notes in computer science PDF image analysis 17th scandinavian ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014