Suchergebnisse - [INFO:INFO_CR] Computer Science/Cryptography and Security
-
1
Autoren: Künnemann, Robert
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, Security API, Verification
-
2
Autoren: Do, Thanh-Toan
Schlagwörter: [INFO:INFO_TI] Computer Science/Image Processing, [INFO:INFO_IR] Computer Science/Information Retrieval, [INFO:INFO_CR] Computer Science/Cryptography and Security, indexation, images, sécurité, SIFT, recherche d'images basée contenu
-
3
Autoren: TOUNSI, Wiem
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, Wireless networks, RFID, Security, Privacy, Authentication, Formal model, Key generation systems
-
4
Autoren: Larrieu, Nicolas
Schlagwörter: [INFO:INFO_NI] Computer Science/Networking and Internet Architecture, [INFO:INFO_NI] Informatique/Réseaux et télécommunications, [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, amélioration de la QdS, gestion de la sécurité, lien entre QdS et sécurité, réseaux contraints, communication de données
-
5
Autoren: Deligne, Eddy
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, [INFO:INFO_RO] Computer Science/Operations Research, [INFO:INFO_RO] Informatique/Recherche opérationnelle, Hyperviseur, Protection, Sécurité, ELF, VT-x, Linux
-
6
Autoren: Beauxis, Romain
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, [INFO:INFO_LO] Computer Science/Logic in Computer Science, [INFO:INFO_LO] Informatique/Logique en informatique, Concurrency Theory, Process Calculi, Anonymity
-
7
Autoren: Andrés, Miguel
Schlagwörter: [INFO:INFO_CL] Computer Science/Computation and Language, [INFO:INFO_CR] Computer Science/Cryptography and Security, Probabilistic Model Checking, Quantitative Information Flow
-
8
Autoren: Huot, Louise
Schlagwörter: [INFO:INFO_SC] Computer Science/Symbolic Computation, [INFO:INFO_SC] Informatique/Calcul formel, [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, base de gröbner, systèmes polynomiaux, courbes elliptiques, problème du logarithme discret, systèmes avec symétries, cryptanalyse algébrique
-
9
Autoren: Jacquin, Ludovic
Schlagwörter: [INFO:INFO_NI] Computer Science/Networking and Telecommunication, [INFO:INFO_NI] Informatique/Réseaux et télécommunications, [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, [INFO:INFO_PF] Computer Science/Performance and Reliability, [INFO:INFO_PF] Informatique/Performance et fiabilité, performance, sécurité, IPsec, ICMP
-
10
Autoren: Estibals, Nicolas
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, [INFO:INFO_AO] Computer Science/Computer Arithmetic, [INFO:INFO_AO] Informatique/Arithmétique des ordinateurs, cryptographie, couplage, opérateur matériel, arithmétique, architecture des ordinateurs
-
11
Autoren: Killijian, Marc-Olivier
Schlagwörter: [INFO:INFO_IU] Computer Science/Ubiquitous Computing, [INFO:INFO_IU] Informatique/Informatique ubiquitaire, [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, vie privée, résilience, systèmes mobiles, informatique ubiquitaire
-
12
Autoren: Oulmakhzoune, Said
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, Privacy, OrBAC, Query rewriting, Data mediation, Data services, SPARQL
-
13
Autoren: Lepoint, Tancrède
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, cryptographie à clé publique, réseaux euclidiens, signature numérique, chiffrement homomorphe, applications multilinéaires, implémentation
-
14
Autoren: Oliveira Maroneze, André
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, Software, Verification, Compilation, Worst-Case Execution Time Estimation, Proof assistants
-
15
Autoren: Hasnaoui, Marwen
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, Stream watermarking, MPEG-4 AVC, M-QIM, Ownership protection, Integrity verification, Drift-free
-
16
Autoren: Guilley, Sylvain
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, Trusted computing, secured electronics, countermeasures, provable security
-
17
Autoren: Thomé, Emmanuel
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, [MATH:MATH_NT] Mathematics/Number Theory, [MATH:MATH_NT] Mathématiques/Théorie des nombres, [INFO:INFO_AO] Computer Science/Computer Arithmetic, [INFO:INFO_AO] Informatique/Arithmétique des ordinateurs, Crible algébrique, Courbes algébriques, Factorisation d'entiers, Logarithme discret, Algèbre linéaire creuse, Corps finis, Arithmétique des polynômes
-
18
Autoren: Kaced, Tarik
Schlagwörter: [INFO:INFO_IT] Computer Science/Information Theory, [INFO:INFO_IT] Informatique/Théorie de l'information, [MATH:MATH_IT] Mathematics/Information Theory, [MATH:MATH_IT] Mathématiques/Théorie de l'information et codage, [MATH:MATH_PR] Mathematics/Probability, [MATH:MATH_PR] Mathématiques/Probabilités, [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, Théorie de l'information, partage de secret, Inégalité d'information, entropie de Shannon, Complexité de Kolmogorov
-
19
Autoren: Kauffmann-Tourkestansky, Xavier
Schlagwörter: [INFO:INFO_ES] Computer Science/Embedded Systems, [INFO:INFO_ES] Informatique/Systèmes embarqués, [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_CR] Informatique/Cryptographie et sécurité, Code, Sécurité, Attaques physiques, Carte à puce, Confidentialité, Intégrité, Injection de faute, Simulation logicielle
-
20
Autoren: Lafourcade, Pascal
Schlagwörter: [INFO:INFO_CR] Computer Science/Cryptography and Security, [INFO:INFO_IA] Computer Science/Computer Aided Engineering, Formal verification, computational model, symbolic model, concrete security, public encryption scheme, encryption modes, MAC, homomorphic encryption, privacy, electronic voting protocol, wireless sensor networks, neigbourhood discovery, indpendent intruders, routing algorithms, resilience
Nájsť tento článok vo Web of Science