نتایج جستجو برای: cryptology
تعداد نتایج: 644 فیلتر نتایج به سال:
information security practice and experience 10th international conference ispec 2014 fuzhou china may 5-8 2014 proceedings lecture notes in computer science security and cryptology PDF advances in cryptology-asiacrypt 96 international conference on the theory and applications of crypotology and information security kyongju lecture notes in computer science PDF image analysis 17th scandinavian ...
Cryptology is a thriving research area of great practical importance. It is a fundamental building block of communications security. Metaheuristic optimisation techniques such as simulated annealing and genetic algorithms have found successful application in a huge number of fields. However, their application to leading edge industrial-strength cryptology has been slight. The power of metaheuri...
8th Central European Conference on Cryptography 2008 1 versions. Finally, we discuss the choice of suitable parameters for an efficient realization of thesystem and its practical usage.References [1] S. S. Magliveras, D. R. Stinson and Tran van Trung, New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups, J. Cryptology, 15 (2002), 28...
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60.
Now, we come to offer you the right catalogues of book to open. advances in cryptology auscrypt 90 international conference on cryptology sydney australia january 8 11 1990 proceedings is one of the literary work in this world in suitable to be reading material. That's not only this book gives reference, but also it will show you the amazing benefits of reading a book. Developing your countless...
Malicious cryptology and malicious mathematics is an emerging domain initiated in Filiol & Josse (2007); Filiol & Raynal (2008;b). It draws its inspiration from crypto virology Young & Yung (2004). However this latter domain has a very limited approach of how cryptography can be perverted by malware. Indeed, their authors consider the case of extortion malware in which asymmetric cryptography i...
In this essay you will find a theory about the relation of videogames and rules. The analysis illustrates the Social Ontology Project founded by John Searle and introduces some new concepts, such as Gameframe, Cyberplace and Interactive Figmentum. After some theoretical arguments you will find a double grill to categorize player types regarding to rules.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید