Listing 1 - 10 of 79 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Fractals --- Image compression --- Data encryption (Computer science)
Choose an application
Choose an application
Wiretapping --- Data encryption (Computer science) --- Privacy, Right of --- Law and legislation --- #SBIB:309H1015 --- Media: politieke, juridische, ethische, ideologische aspecten (incl. privacy) --- Wiretapping - United States --- Data encryption (Computer science) - Law and legislation - United States --- Privacy, Right of - United States
Choose an application
Internet --- Computer networks --- Security measures --- Smart cards --- Electronic funds transfers --- Security measures --- Data encryption (Computer science) --- Electronic funds transfers - Security measures. --- Data encryption (Computer science) --- Electronic funds transfers - Computer programs.
Choose an application
Cryptography --- Data encryption (Computer science) --- Cryptographie --- Chiffrement (Informatique) --- Congresses --- Congrès --- Computers --- Access control --- Data transmission systems --- Security measures --- Criptografía
Choose an application
Cryptage des données (Ordinatique) --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Internet --- Chiffrement (Informatique) --- Security measures --- Sécurité --- Mesures --- 681.3*E3 --- computernetwerken --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Security measures. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Sécurité
Choose an application
This book constitutes the refereed proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, held in Pacifico Yokohama, Japan, in February 1998. The volume presents four invited contributions together with 18 revised full papers selected from 30 submissions. The papers address all current issues in research and design in the area including digital signature schemes, digital payment systems, electronic commerce, cryptographic protocols, as well as foundational issues like integer factorization, elliptic curve aspects, hash functions, finite fields, etc.
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Congresses --- Access control --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Computers. --- Algorithms. --- Computer Science. --- Data Encryption. --- Theory of Computation. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Information theory. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Communication theory --- Communication --- Cybernetics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Cyberspace --- Distributed processing --- Foundations --- Computer security - Congresses --- Computers - Access control - Congresses --- Data encryption (Computer science) - Congresses --- Public key cryptography - Congresses
Choose an application
cryptografie --- strafrecht --- Law --- privacy --- internet --- Cryptologie --- Data encryption (Computer science) --- Law and legislation --- 343.2 --- Data encryption (Compter science) --- -681.3*D46 --- 681.3*D46 --- Algemeen strafrecht --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 343.2 Algemeen strafrecht --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data encryption (Computer science) - Law and legislation - Belgium
Listing 1 - 10 of 79 | << page >> |
Sort by
|