Cryptography

Private updates to anonymous databases

History / Computer Science / Privacy / Data Management / Cryptography / Anonymity / Content Management / Databases / Data Privacy / Data Security / Database Management / Secure Computation / Anonymity / Content Management / Databases / Data Privacy / Data Security / Database Management / Secure Computation

Digital Signatures for Centralized DSA Networks

Digital Signature / Cryptography / Cognitive radio / Key Management / Radio Frequency / Resource Management / Public key cryptography / Spectrum / Digital Signatures / Boolean Satisfiability / Denial of Service Attack / Resource Management / Public key cryptography / Spectrum / Digital Signatures / Boolean Satisfiability / Denial of Service Attack

SMART AS A CRYPTOGRAPHIC PROCESSOR

Cryptography / Microprocessors / Smart / Communication Security / Data Encryption Standard / CISC and RISC comparison

Bitcoin: A Peer-to-Peer Electronic Cash System

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

Enhanced TDMA based MAC protocol for adaptive data control in wireless sensor networks

Distributed Computing / Wireless Communications / Computer Networks / Cryptography / Communications networks

Bitcoin: A Peer-to-Peer Electronic Cash System

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

SCR: a practical approach to building a high assurance COMSEC system

Embedded Systems / Cryptography / Theorem Proving / Control Systems / Rocket/Missile Embedded Control System / Hardware / Formal Specification / Software Systems / Thyristors / Application Software / Hardware / Formal Specification / Software Systems / Thyristors / Application Software

Reconfigurable memory based AES Co-processor

Art / Polymorphism / Cryptography / Field-Programmable Gate Arrays / Hardware Design / Hardware / Throughput / CoProcessors / Chip / Prototypes / Polynomials / Hardware / Throughput / CoProcessors / Chip / Prototypes / Polynomials

Computação sobre dados cifrados em GPGPUs

High Performance Computing / Cryptography / Quantum Cryptography / Compute Unified Device Architecture NVIDIA CUDA / Homomorphic Encryption / Fully Homomorphic Encryption

Computação sobre dados cifrados em GPGPUs

High Performance Computing / Cryptography / Homomorphic Encryption / Fully Homomorphic Encryption

Computação sobre dados cifrados em GPGPUs

High Performance Computing / Cryptography / Compute Unified Device Architecture NVIDIA CUDA / Homomorphic Encryption / Fully Homomorphic Encryptions / Fully Homomorphic Encryption

A Privacy Preserving System for Cloud Computing

Privacy / Access Control / Software Architecture / Cryptography / Outsourcing / Cloud Computing / Database Management Systems / Data Privacy / Data Security / Privacy Preservation / Cloud Computing / Database Management Systems / Data Privacy / Data Security / Privacy Preservation

Um estudo comparativo dos protocolos de dinheiro digital

Cryptography / Comparative Study / Architectures / Digital Money

Bitcoin: A Peer-to-Peer Electronic Cash System

Computer Science / Information Technology / Information Security / Computer Security / Cryptography

A note on a signature system based on probabilistic logic

Engineering / Privacy / Cryptography / Probabilistic Logic / Mathematical Sciences / Information Transfer

A temporal domain audio watermarking technique

Audio Signal Processing / Data Compression / Watermarking / Computer Security / Cryptography / Audio watermarking / Multidisciplinary / Digital Watermarking / Transparency / Dsp Based Audio Compression / Wavelet Transforms / Robustness / Immune system / Signal Detection / Acoustic Modeling / Audio watermarking / Multidisciplinary / Digital Watermarking / Transparency / Dsp Based Audio Compression / Wavelet Transforms / Robustness / Immune system / Signal Detection / Acoustic Modeling
Copyright © 2017 DADOSPDF Inc.