Showing 5,761 - 5,780 results of 5,910 for search '"cryptography"', query time: 0.64s Refine Results
  1. 5761
    by Kaido, Rodrigo Tsuneyoshi
    Published 2014
    .... In addition to classical cryptography strategies commonly used to increase the security in communications...
    Get full text
  2. 5762
    by Barbosa, Ana Claudia Dytz
    Published 2009
    ... Information tables descriptors use, content cryptography related to conditional access system, watermarking...
    Get full text
  3. 5763
    by Kaido, Rodrigo Tsuneyoshi
    Published 2014
    .... In addition to classical cryptography strategies commonly used to increase the security in communications...
    Get full text
  4. 5764
    by Gualberto, Thiago de Medeiros
    Published 2016
    .... INCA uses cryptography and digital signature to provide integrity, non-repudiation, confidentiality...
    Get full text
    Others
  5. 5765
    by Fornazin, Marcelo [UNESP]
    Published 2014
    ... cryptosystems join biometrics and cryptography to encode biometric information and protected them. Fuzzy Vault...
    Get full text
    Others
  6. 5766
    ..., implemented in the wavelet domain, along with simple matrix manipulations used in cryptography aims to provide...
    Get full text
    Get full text
    Others
  7. 5767
    by Marina Jeaneth Machicao Justo
    Published 2017
    ... recognition applications from a wide branch of fields such as Cryptography, Cryptanalysis, Biology and Data...
    Get full text
  8. 5768
    by PONA, Igor Rafael de Oliveira
    Published 2018
    ... through several fields like scientific modeling, artificial intelligence, cryptography, cloud computing...
    Get full text
  9. 5769
    by George Andrà Pereira ThÃ
    Published 2006
    ... a cryptography key through a secure channel (guaranteed by laws of quantum mechanics). The most...
    Get full text
    Others
  10. 5770
    by Deloge, Matthieu
    Published 2011
    ... the storage of secured information with respect to cryptography or else. The thesis focuses...
    Get full text
  11. 5771
    Published 2002
    ... --- p.9 === Chapter 2.7 --- Summary --- p.11 === Chapter 3 --- Cryptography and Field-Programmable Gate...
    Get full text
    Get full text
    Others
  12. 5772
    by Calmon, Flavio du Pin
    Published 2016
    ... (pages 143-150). === In this thesis, we study problems in cryptography, privacy and estimation through...
    Get full text
    Others
  13. 5773
    by Vennos, Amy Demetra Geae
    Published 2021
    ... alternative for casinos to the higher-cost TRNG. === Master of Science === Cryptography, or the encrypting...
    Get full text
    Others
  14. 5774
    by Ongkasuwan, Patarawan
    Published 2020
    ...The ideas and techniques of cryptography and decentralized storage have seen tremendous growth...
    Get full text
    Others
  15. 5775
    by Blanchard, Enka
    Published 2019
    ... thèse vise à résoudre ces problèmes avec des solutions inspirées par la cryptographie, la psychologie...
    Get full text
  16. 5776
    by Reznychenko, Bogdan
    Published 2018
    ... du calcul et de la cryptographie. Il est attendue, que des problèmes impossibles à résoudre avec des...
    Get full text
  17. 5777
    by Fan, Xinxin
    Published 2010
    ... cryptography. Firmly rooted in statistics, our key revocation scheme provides a theoretically sound basis...
    Get full text
  18. 5778
    by Fan, Xinxin
    Published 2010
    ... cryptography. Firmly rooted in statistics, our key revocation scheme provides a theoretically sound basis...
    Get full text
  19. 5779
    ... by the issues of mathematical modeling, cryptography language code detections, dynamical systems, stochastic...
    Get full text
    Article
  20. 5780
    by Melgar, Max Eduardo Vizcarra
    Published 2013
    ... models can store was designed for future storage and transmission of cryptography protocols...
    Get full text