Cryptography

Crypto processor for contactless smart cards

Power Management / Cryptography / Energy Management / Smart Cards / Power Consumption / Feedback / Random access memory / Throughput / Smart Card / NIST / Boolean Satisfiability / Power Reduction / Switching Activity / Feedback / Random access memory / Throughput / Smart Card / NIST / Boolean Satisfiability / Power Reduction / Switching Activity

Cryptanalysis of a multi-chaotic systems based image cryptosystem

Image Processing / Cryptography / Chaotic System / Optical physics / Electrical And Electronic Engineering / Shuffling

PRIORITY BASED RSA CRYPTOGRAPHIC TECHNIQUE

Information Security / Cryptography / RSA ALGORITHM / Encryption and Decryption / Priority Scheduling

Bitcoin: A Peer-to-Peer Electronic Cash System

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

Bitcoin: A Peer-to-Peer Electronic Cash System

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

ESM Cipher

Mathematics / Number Theory / Applied Mathematics / Mathematics of Cryptography / Applied Cryptography / Cryptography / Elementary Number Theory / Cryptology / Ciphering / Cipher / Cryptography / Elementary Number Theory / Cryptology / Ciphering / Cipher

Esteganografia tesis-master

Image Processing / Cryptography

cuYASHE: Computação sobre dados cifrados em GPGPUs

Parallel Programming / Cryptography / Quantum Cryptography / Compute Unified Device Architecture NVIDIA CUDA

10 Centralized Database

Information Systems / Computer Science / Information Security / Computer Security / Cryptography

IJIAS paper

Computer Science / Information Security / Computer Security / Cryptography

A compact 32-bit AES design for embedded system

Embedded Systems / Cryptography / Field-Programmable Gate Arrays / Encryption / Smart Cards / Algorithm Design / Throughput / Field Programmable Gate Array / Smart Card / Data Encryption / Embedded System / Rijndael Algorithm / Algorithm Design / Throughput / Field Programmable Gate Array / Smart Card / Data Encryption / Embedded System / Rijndael Algorithm

A Fine-Grained Data Access Control System in Wireless Sensor Network

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

Cryptic Mining: Apriori Analysis of Parameterized Automatic Variable Key based Symmetric Cryptosystem

Information Systems / Mathematics of Cryptography / Computer Science / Software Engineering / Information Technology / Informatics / Information Security / Computer Engineering / Data Mining / Mobile Technology / Computer Networks / Information Communication Technology / Applied Cryptography / Computer Security / Cryptography / Quantum Cryptography / Public Key Crypto systems / Information and Communication Technologies / Informatics / Information Security / Computer Engineering / Data Mining / Mobile Technology / Computer Networks / Information Communication Technology / Applied Cryptography / Computer Security / Cryptography / Quantum Cryptography / Public Key Crypto systems / Information and Communication Technologies

Chaotic Progressive Access Control for JPEG2000 Images Repositories

Quantum Computing / Artificial Intelligence / Environmental Education / Machine Learning / Data Mining / Network Security / Access Control / Wireless Sensor Networks / Cryptography / Chaotic cryptography / Cloud Computing / Digital Image Processing / Java / Smart spaces / Indigenous knowledge systems / Cyber Physical Systems / Complex Event Processing / Wavelet Transform / Wavelet Transforms / Cyber Security / Semantic Computing / Chaotic Map / Unimodal Maps / JPEG / Authorisation / Permutation Only Ciphers / Substitution Permutation Networks / Image Compression Location Based Approach / CBNRM / Education for Sustainable Development / Encryption Algorithms / Arnold Map / Secure Image Transmission / Access Control Schemes / Decryption Process / Gray Levels / Image Codestreams / Digital Image Storage / VoIP/SIP/IMS / Distributed Information Systems / RFID and Sensor Networks / Open Source Technologies / Wild/Indigenous & Traditional Food Plants / Traditional Agrobiodiversity Conservation / Food Sovereignty & Food Security / Discrete Fractional Fourier Transform / Wavelet Transform and Filter Banks / Digital Signal Processing and Its Applications / Sensor Array Signal Processing / Two Dimensional Digital Filters / Topological Entropy / Packet Analysis / Server Operating Systems / NET Software Development / Network Security / Access Control / Wireless Sensor Networks / Cryptography / Chaotic cryptography / Cloud Computing / Digital Image Processing / Java / Smart spaces / Indigenous knowledge systems / Cyber Physical Systems / Complex Event Processing / Wavelet Transform / Wavelet Transforms / Cyber Security / Semantic Computing / Chaotic Map / Unimodal Maps / JPEG / Authorisation / Permutation Only Ciphers / Substitution Permutation Networks / Image Compression Location Based Approach / CBNRM / Education for Sustainable Development / Encryption Algorithms / Arnold Map / Secure Image Transmission / Access Control Schemes / Decryption Process / Gray Levels / Image Codestreams / Digital Image Storage / VoIP/SIP/IMS / Distributed Information Systems / RFID and Sensor Networks / Open Source Technologies / Wild/Indigenous & Traditional Food Plants / Traditional Agrobiodiversity Conservation / Food Sovereignty & Food Security / Discrete Fractional Fourier Transform / Wavelet Transform and Filter Banks / Digital Signal Processing and Its Applications / Sensor Array Signal Processing / Two Dimensional Digital Filters / Topological Entropy / Packet Analysis / Server Operating Systems / NET Software Development
Copyright © 2017 DADOSPDF Inc.