Listing 1 - 10 of 17 | << page >> |
Sort by
|
Choose an application
algebraic --- algebraic topology --- cryptography --- coding theory --- banach algebras --- combinatorics
Choose an application
Periodicals --- Isecure --- Information --- security --- cryptology --- Cryptography --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- isecure --- information
Choose an application
Algebra --- Algebra. --- algebraic coding theory --- cryptography --- algebraic combinatorics --- design theory --- graph theory --- Mathematics --- Mathematical analysis
Choose an application
cryptanalysis --- secret-key cryptography --- cryptographic protocols --- secure smart system/device --- digital rights management --- quantum safe cryptography --- Data encryption (Computer science) --- Cryptography --- Cryptography. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer Science --- Engineering sciences. Technology
Choose an application
block cipher --- implementation --- symmetric cryptology --- stream cipher --- hash function --- cryptanalysis --- Cryptography --- Ciphers
Choose an application
The fully open access Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security. The journal is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the human aspects of cybersecurity. Journal of Cybersecurity provides a hub around which the interdisciplinary cybersecurity community can form, and is committed to providing quality conceptual and empirical research, as well as scholarship, that is grounded in real-world implications and solutions.
Internet --- Security measures --- Periodicals --- Sécurité --- Mesures --- Périodiques --- Computer security --- Cryptography --- Computer science --- Computer science. --- Computer security. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Informatics --- security --- cryptography --- cybersecurity --- information security --- privacy --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data protection --- Security systems --- Hacking --- Science --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Sécurité informatique --- Cryptographie --- Informatique
Choose an application
Electrical engineering --- Mechanical engineering --- Materials science --- Electrical engineering. --- Mechanical engineering. --- Research --- Research. --- engineering design --- advanced materials science --- biomedical engineering and instrumentation --- cryptography --- microelectromechanical systems --- vlsi design
Choose an application
foundations of quantum mechanics --- quantum optics and metrology --- quantum information: communication --- cryptography --- Quantum theory --- Quantum dynamics --- Quantum mechanics --- Quantum physics --- Physics --- Mechanics --- Thermodynamics --- Quantum theory.
Choose an application
Quantum communication --- Quantum communication. --- Quantum communications --- Optical communications --- quantum cryptography --- optical fibre networks --- quantum optics --- quantum computing --- quantum wireless communication --- Teoria quàntica
Choose an application
Periodicals --- Conferences - Meetings --- Mathematical Sciences --- Applied Mathematics --- Computer security --- Cryptography --- Computer networks --- Sécurité informatique --- Cryptographie --- Réseaux d'ordinateurs --- Periodicals. --- Security measures --- Périodiques --- Sécurité --- Mesures --- EJINFOR EJINGEN EPUB-ALPHA-I EPUB-PER-FT IET-E --- cryptography --- software security --- database security
Listing 1 - 10 of 17 | << page >> |
Sort by
|