Showing 5,641 - 5,660 results of 5,910 for search '"cryptography"', query time: 0.90s Refine Results
  1. 5641
    by Yeuan-Kuen Lee, 李遠坤
    Published 2002
    ... with cryptography attempting to conceal the content of the secret message, steganography conceals the very existence...
    Get full text
    Others
  2. 5642
    .... _______________________________________________________________________________________ ABSTRACT === In this work, we study the main concepts of cryptography and show its evolutionthroughout...
    Get full text
  3. 5643
    .... ______________________________________________________________________________________________ ABSTRACT === In this paper we discuss some topics related to elementary cryptography, symmetric...
    Get full text
  4. 5644
    by Torres, Adriano Contini.
    Published 2012
    ..., quantum teleportation, quantum cryptography, dense coding, and quantum error correction. Although quantum...
    Get full text
    Others
  5. 5645
    by Destefani, Guilherme Herrmann
    Published 2010
    .... === This work discusses a series of security mechanisms based in cryptography, combining them with concepts...
    Get full text
    Others
  6. 5646
    ... almacenamiento. La Criptografía basada en identidad (o Identity Based Cryptography, IBC) es una alternativa al...
    Get full text
  7. 5647
    by Le, Anhtuan
    Published 2017
    ... the cryptography codes of such devices and use them to operate like an internal source. These malicious sources can...
    Get full text
  8. 5648
    by Destefani, Guilherme Herrmann
    Published 2010
    .... === This work discusses a series of security mechanisms based in cryptography, combining them with concepts...
    Get full text
    Others
  9. 5649
    by Mezzari, Rafael
    Published 2013
    ... is to use cryptography methods. But visibly encrypted information arouses suspicions and curiosity. Due...
    Get full text
  10. 5650
    by Litoldo, Beatriz Fernanda.
    Published 2016
    ... listing this entanglement with the constant evolution of cryptography and its constant search of safe...
    Get full text
    Others
  11. 5651
    by Mercorio, Philippe
    Published 2008
    ... relèvent davantage de facteurs politiques que techniques ou juridiques. Ainsi la cryptographie et...
    Get full text
    Others
  12. 5652
    by Alqahtani, Fahad Ali
    Published 2014
    ... is semi-trusted. The proposed protocol makes use of symmetric key cryptography wherever possible to ensure...
    Get full text
  13. 5653
    by Dib, Stephanie
    Published 2013
    ...Parmi les différents critères qu'une fonction booléenne doit satisfaire en cryptographie...
    Get full text
  14. 5654
    by Sepúlveda Castellanos, Alonso
    Published 2008
    ..., moreover, we show an algorithm to apply these computations to the cryptography; ¿ We calculate...
    Get full text
    Get full text
    Others
  15. 5655
    by Santos, Júlio César dos
    Published 2016
    ... secret? It is noticed that in spite of the outstanding presence of cryptography and of the incorporeal...
    Get full text
    Others
  16. 5656
  17. 5657
    by Wilson Ricardo Matos Rabelo
    Published 2006
    ... in the quantum cryptography and state filtering, and present a computational code in MATLAB. Our additional...
    Get full text
    Others
  18. 5658
    ... such as robotics, power systems, computer vision, cryptography, and chemical reaction networks, can be modeled...
    Get full text
    Others
  19. 5659
    .... The applications are cryptography, Markov chains, graphs, plane transforms and linear systems. We realized...
    Get full text
  20. 5660
    by Yu, Shucheng
    Published 2010
    ... these challenge issues, this dissertation studies and enhances a novel public-key cryptography -- attribute-based...
    Get full text
    Get full text
    Others