Search Results - "Cryptology."
Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography 15
- Cryptology 15
- Data encryption (Computer science) 15
- Data and Information Security 8
- Data protection 8
- Communications Engineering, Networks 7
- Telecommunication 7
- Signal processing 6
- Signal, Speech and Image Processing 6
- Electronic Circuits and Systems 5
- Electronic circuits 5
- Security Science and Technology 4
- Security systems 4
- Computer architecture 3
- Electronics 3
- Electronics and Microelectronics, Instrumentation 3
- Microprocessors 3
- Processor Architectures 3
- Algorithms 2
- Application software 1
- Coding and Information Theory 1
- Coding theory 1
- Computational Intelligence 1
- Computational intelligence 1
- Computer Application in Administrative Data Processing 1
- Computer Imaging, Vision, Pattern Recognition and Graphics 1
- Computer and Information Systems Applications 1
- Computer vision 1
- Computers 1
- Digital techniques 1
-
1
Multi-photon Quantum Secure Communication
Published 2019Subjects: Full-text access
View in OPAC
e-Book -
2
Secure and Privacy-Preserving Data Communication in Internet of Things
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
3
Domain Specific High-Level Synthesis for Cryptographic Workloads
Published 2019Subjects: Full-text access
View in OPAC
e-Book -
4
Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /
Published 2018Subjects: Full-text access
View in OPAC
e-Book -
5
Fault Tolerant Architectures for Cryptography and Hardware Security
Published 2018Subjects: Full-text access
View in OPAC
e-Book -
6
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
Published 2019Subjects: Full-text access
View in OPAC
e-Book -
7
Hardware Protection through Obfuscation
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
8
On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids /
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
9
-
10
The Hardware Trojan War Attacks, Myths, and Defenses /
Published 2018Subjects: Full-text access
View in OPAC
e-Book -
11
-
12
-
13
Digital Watermarking Techniques and Trends /
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
14
Reconfigurable Cryptographic Processor
Published 2018Subjects: Full-text access
View in OPAC
e-Book -
15
Steganography Techniques for Digital Images
Published 2019Subjects: Full-text access
View in OPAC
e-Book