Categoría
Top Descargas
Iniciar sesión
Registrarse
Subir
Búsqueda
Categoría
Top Descargas
Iniciar sesión
Registrarse
Búsqueda
Home
Categories
Cryptography
Cryptography
El Gamal
Cryptography
MultiDimensional Range Query over Encrypted Data
Auditing / Cryptography / Problem Solving / Intrusion Detection / Protocols / Data Privacy / Network Flow / Multi Dimensional / Privacy Preservation / Range Query / Data Privacy / Network Flow / Multi Dimensional / Privacy Preservation / Range Query
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform
Image Processing / Data Compression / Cryptography / Distributed Storage / High Resolution / Lossless Image Compression / Radon Transform / Selective Encryption / Lossless Compression / Compression Ratio / Lossless Image Compression / Radon Transform / Selective Encryption / Lossless Compression / Compression Ratio
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform
Image Processing / Data Compression / Cryptography / Distributed Storage / High Resolution / Lossless Image Compression / Radon Transform / Selective Encryption / Lossless Compression / Compression Ratio / Lossless Image Compression / Radon Transform / Selective Encryption / Lossless Compression / Compression Ratio
UPDATE query over encrypted data
Computer Architecture / Mechatronics / Performance / Cryptography / Encryption / Databases / Database Security / Computers / Databases / Database Security / Computers
Efficient Unidirectional Proxy Re-Encryption
Cryptography / Encryption / Distributed Storage / Random Oracle Model / High Efficiency / Proxy Re-Encryption
documental sustentable
Information Security / Mobile Ad Hoc Networks / Computer Networks / Security / Wireless Sensor Networks / Internet Security / Computer Security / Intrusion Detection Systems / Cryptography / WSN (Wireless sensor network) / Network Intrusion Detection & Prevention / Intrusion Detection / Ad Hoc Networks / IDS / Sensor Network / Intrusion Detection System / Wireless Sensor Network / Wireless Ad Hoc Network / Internet Security / Computer Security / Intrusion Detection Systems / Cryptography / WSN (Wireless sensor network) / Network Intrusion Detection & Prevention / Intrusion Detection / Ad Hoc Networks / IDS / Sensor Network / Intrusion Detection System / Wireless Sensor Network / Wireless Ad Hoc Network
A Tutorial on Elliptic Curve Cryptography (ECC) A Tutorial on Elliptic Curve Cryptography 2
Cryptography
Communication Alternatives Exploration in Model-Driven Design of Networked Embedded Systems
Wireless Communications / Computer Networks / Cryptography
RDF XML Customized Protocol (RXCP)
XML / Tcp/Ip / Cryptography / RDF / Protocol / AES / Des / AES / Des
Un sistema de discusión seguro con participación anónima a través de servicios Web
Mechanical Engineering / Digital Signature / Cryptography / Anonymity / Blind Signature
Fortalecimiento del llavero de confianza en un proyecto geográficamente distribuido
Cryptography / Open Source and Free Software Studies / Free Software / Identity / Debian (Linux)
Restore files nnlfd
Computer Science / Cryptography
Towards an Ultra Lightweight Crypto Processor
Software Architecture / Cryptography / Radiation Detectors / CoProcessors / Cryptographic Engineering / Block Cipher / Registers / Direct Memory Access / Hash Function / Block Cipher / Registers / Direct Memory Access / Hash Function
Estimativa de intervalo máximo entre números primos para criptografia RSA
Number Theory / Cryptography
Ac els-cdn com S1568494611001967 1-s2 0-S1568494611001967-main
Computer Science / Artificial Intelligence / Information Security / Machine Learning / Data Mining / Wireless Communications / Database Systems / Operations Research / Computer Networks / Numerical Analysis / Computer Security / Cryptography / Databases / Wireless Communications / Database Systems / Operations Research / Computer Networks / Numerical Analysis / Computer Security / Cryptography / Databases
1
2
3
»
Copyright © 2017 DATOSPDF Inc.