Search Results - "cryptography"
Suggested Topics within your search.
Suggested Topics within your search.
- Communications Engineering, Networks 36
- Telecommunication 36
- Computational Intelligence 31
- Computational intelligence 31
- Data protection 24
- Data and Information Security 22
- Cryptography 20
- Signal processing 19
- Signal, Speech and Image Processing 19
- Artificial Intelligence 18
- Artificial intelligence 18
- Data encryption (Computer science) 17
- Electronic Circuits and Systems 17
- Electronic circuits 17
- Cryptology 15
- Computer Communication Networks 10
- Computer networks 10
- Computer architecture 9
- Electronics 9
- Electronics and Microelectronics, Instrumentation 9
- Microprocessors 9
- Processor Architectures 9
- Information theory 7
- Security Science and Technology 7
- Security systems 7
- Coding theory 6
- Data Mining and Knowledge Discovery 6
- Data mining 6
- Mathematics 6
- Algorithms 5
-
1
-
2
Applied cryptography : protocols, algorithms, and source code in C /
Published 2015Subjects: “…Cryptography. 61141…”
View in OPAC
Book -
3
-
4
-
5
-
6
Fault Tolerant Architectures for Cryptography and Hardware Security
Published 2018Subjects: Full-text access
View in OPAC
e-Book -
7
Kriptografiye giriş : şifreleme teorisi /
Published 2016Subjects: “…Cryptography. 61141…”
View in OPAC
Book -
8
Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /
Published 2018Subjects: Full-text access
View in OPAC
e-Book -
9
Multi-photon Quantum Secure Communication
Published 2019Table of Contents: “…Introduction to Classical Cryptography -- Contemporary Quantum Key Distribution Techniques -- The Y-00 Protocol -- Multi-stage Multi-Photon Techniques in Cryptography -- Variations of Multi-Photon Protocols -- Multi-stage Multi-Photon Techniques in Wireless Communication -- Cryptographic strength of Multi-Photon Techniques -- Intrusion Detection System using the Polarization Channel -- Secure Key Transfer Using the Polarization Channel. .…”
Full-text access
View in OPAC
e-Book -
10
Secure and Privacy-Preserving Data Communication in Internet of Things
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
11
Domain Specific High-Level Synthesis for Cryptographic Workloads
Published 2019Table of Contents: “…Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.…”
Full-text access
View in OPAC
e-Book -
12
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
Published 2019Subjects: Full-text access
View in OPAC
e-Book -
13
Hardware Protection through Obfuscation
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
14
On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids /
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
15
-
16
The Hardware Trojan War Attacks, Myths, and Defenses /
Published 2018Subjects: Full-text access
View in OPAC
e-Book -
17
-
18
-
19
Digital Watermarking Techniques and Trends /
Published 2017Subjects: Full-text access
View in OPAC
e-Book -
20