Search results
Create the page "Cryptographic Techniques" on this wiki! See also the search results found.
- * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques3 KB (431 words) - 16:48, 14 October 2008
- Techniques and Applications index distribution schemes, memory management techniques, etc.5 KB (644 words) - 22:10, 14 October 2008
- ...Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, l * Cryptographic primitives for wireless communication2 KB (291 words) - 22:19, 14 October 2008
- * Techniques and Tools for Formal Verification * game theoretic aspects of cryptographic protocols6 KB (682 words) - 09:18, 14 April 2020
- ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;13 KB (1,617 words) - 18:03, 24 November 2008
- Communications Techniques and Technologies * IF/RF Technologies and Techniques5 KB (526 words) - 00:02, 2 February 2009
- * Cryptographic techniques and key management * Cryptographic hardware design16 KB (2,178 words) - 11:59, 18 January 2009
- * Cryptographic protocols and key management in UCS * System/network management techniques and strategies in UE.6 KB (793 words) - 14:12, 1 October 2020
- - applications of cryptographic techniques - techniques for developing secure systems12 KB (1,690 words) - 16:08, 27 February 2009
- Wireless Routing Techniques Cryptographic Algorithms and their Applications5 KB (578 words) - 09:21, 20 November 2020
- Wireless Routing Techniques Cryptographic Algorithms and their Applications5 KB (599 words) - 09:21, 20 November 2020
- ...; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware to Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./;6 KB (746 words) - 10:35, 2 August 2009
- - Wireless Routing Techniques - Cryptographic Algorithms and their Applications5 KB (667 words) - 13:27, 13 September 2009
- * Cryptographic techniques and key management * Cryptographic hardware design10 KB (1,270 words) - 16:12, 20 April 2010
- * › Cryptographic Techniques and Key Management Area 3: Cryptographic Techniques and Key Management4 KB (409 words) - 14:40, 5 February 2010
- - Cryptographic protocols and key management in UCS - System/network management techniques and strategies in UE.3 KB (498 words) - 01:52, 22 December 2012
- * Attacks with novel insights, techniques, or results * Analysis of deployed cryptography and cryptographic protocols3 KB (343 words) - 15:31, 6 May 2020
- ...representation, network management, network optimization, problem solution techniques, and so on), to communicate the network devices to transfer data between th ...unication layer. Algorithms and protocols based on artificial intelligence techniques for network management, network monitoring, quality of service enhancement,6 KB (833 words) - 14:16, 24 September 2020
- *Novel cryptographic algorithms for VANETs *Secure and privacy‐preserving aggregation techniques for VANETs2 KB (233 words) - 05:32, 20 September 2016
- |Field=Cryptographic Techniques244 bytes (29 words) - 13:16, 9 October 2016