Search

Your search keyword '"Cryptography -- Usage"' showing total 174 results

Search Constraints

Start Over You searched for: Descriptor "Cryptography -- Usage" Remove constraint Descriptor: "Cryptography -- Usage"
174 results on '"Cryptography -- Usage"'

Search Results

1. Provision Of Services For The Provision Of Licenses For The Right To Use A Software Tool For Cryptographic Information Protection (electronic Signature Tool), With The Transfer Of Non-exclusive Rights To The Perpetual Use Of The Software

2. Ride the Blockchain Roller Coaster: L&D professionals should keep in mind these seven aspects about blockchain

3. Study Data from SRM University-AP Update Knowledge of Information and Data Encoding and Encryption (The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications)

5. PsiQuantum publishes paper projecting a 700x reduction in the computational resource requirements for breaking Elliptic Curve Cryptography using a fault tolerant quantum computer

6. Flipping heck! Random numbers

7. Shaping the future of financial reporting: Dr John McCallig's research into the accounting system of the future built on blockchain technology and cryptography has earned him a sought-after award for invention

8. Infineon Technologies AG Researcher Focuses on Information and Data Encoding and Encryption (Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations)

9. The Provision Of Services For The Transfer Of Licenses Of Non -exclusive Rights Of The Use Of Cryptographic Information Protection Of Information In The Framework Of The Organization And Conduct Of The Gia In The Moscow Region In 2023

10. The Provision Of Non -exclusive Rights To The Use Of Software And Cryptographic Information Protection Of Information For The Organization Of Secure Communication Users Used To Organize Information Protection In The Russian Ministry Of Internal Affairs In

11. Lone Star

12. Studies from Sapienza University of Rome in the Area of Cryptography Described (A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability)

13. Reports from Sastra Deemed to be University Advance Knowledge in Telemedicine (Reversible Data Hiding Scheme Using Deep Learning and Visual Cryptography for Medical Image Communication)

14. Indian Institute of Technology Researchers Update Knowledge of Cryptography (Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio)

16. Ending piracy of integrated circuits

17. Evaluation of power constant dual-rail logics countermeasures against DPA with design time security metrics

20. The tiled bitmap forensic analysis algorithm

21. Pseudorandom bit generation using coupled congruential generators

24. Dynamic routing with security considerations

25. How to keep secrets safe

26. Mutual anonymity for mobile P2P systems

28. Secure antnet routing algorithm for scalable Adhoc etworks using Elliptic Curve Cryptography

29. A new error correction intuitive approach in quantum communications protocols

30. Comb architectures for finite field multiplication in IF2m

31. A generic construction of Cartesian authentication codes

32. An on-demand coherent single-electron source

33. Generalized binary Udaya-Siddiqi sequences

34. A joint signal processing and cryptographic approach to multimedia encryption

35. An improved cryptanalytic attack on knapsack cipher using genetic algorithm

36. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction

38. On the shannon cipher system with a capacity-limited key-distribution channel

40. Cryptography as an operating system service: a case study

41. Protecting File Systems with Transient Authentication

43. A system theory approach for designing cryptosystems based on hyperchaos

44. Dynamic participation in a secure conference scheme for mobile communications

45. Vice over IP: a growing cadre of criminals is hiding secret messages in voice data

47. Philippines : DICT prescribes use of latest cryptographic protocols for gov't websites

49. Security: applying cryptography using the CNG APIs in Windows Vista

50. Secure spread spectrum watermarking for multimedia

Catalog

Books, media, physical & digital resources