×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [applied cryptography]
Home >
applied cryptography
Lecture 1
859 views
CNS
149 views
Basics of Coding Theory
2.100 views
12/01/19993. Protection of Information Assets (25%) 3. Protection of Information Assets 3. Protection of Information Assets (25%) Protecting Personal &
215 views
TeleTrusT - Competence Association for Applied Cryptography and Biometrics Arno Fiedler (Nimbus Network) TeleTrusT Deutschland e. V. E-Mail:
[email protected]
.
214 views
A. Steffen, 10.4.2000, KSy_Crypto.ppt 1 Zürcher Hochschule Winterthur Kommunikationssysteme (KSy) - Block 9 Secure Network Communication Dr. Andreas Steffen.
217 views
Emergent Vulnerabilities And Attacks: A complex threat landscape NATHANIEL HUSTED
[email protected]
@INDIANA.EDU INDIANA UNIVERSITY.
216 views
Conventional Encryption NS2
5.418 views
Crypto Strikes Back! (Google 2009)
4.159 views
When Crypto Attacks! (Yahoo 2009)
4.779 views
Introduction to IS course
1.074 views
A deception framework for survivability against next generation
318 views
Next >