Literatura científica selecionada sobre o tema "Applied cryptology"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Applied cryptology".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Applied cryptology"
Madhavan, C. E. Veni, e P. K. Saxena. "Recent Trends in Applied Cryptology". IETE Technical Review 20, n.º 2 (março de 2003): 119–28. http://dx.doi.org/10.1080/02564602.2003.11417076.
Texto completo da fonteJohnson, Mike. "CRYPTOLOGY IN CYBERSPACE". Cryptologia 19, n.º 4 (outubro de 1995): 392–96. http://dx.doi.org/10.1080/0161-119591884042.
Texto completo da fonteWinkel, Brian J. "EXTRAORDINARY CRYPTOLOGY COLLECTION". Cryptologia 27, n.º 2 (abril de 2003): 180–81. http://dx.doi.org/10.1080/0161-110391891847.
Texto completo da fonteDanziger, Moises, e Marco Aurelio Amaral Henriques. "Computational Intelligence Applied on Cryptology: a brief review". IEEE Latin America Transactions 10, n.º 3 (abril de 2012): 1798–810. http://dx.doi.org/10.1109/tla.2012.6222587.
Texto completo da fonteBauer, Craig, e Suzanne E. Gladfelter. "CRYPTOLOGY IN YORK PENNSYLVANIA". Cryptologia 29, n.º 2 (abril de 2005): 159–75. http://dx.doi.org/10.1080/0161-110591893861.
Texto completo da fonteRocca, Charles F. "CRYPTOLOGY IN GENERAL EDUCATION". Cryptologia 29, n.º 4 (outubro de 2005): 337–42. http://dx.doi.org/10.1080/0161-110591893915.
Texto completo da fonteKruh, Louis. "CRYPTOLOGY IN AMERICAN HISTORY". Cryptologia 29, n.º 3 (julho de 2005): 280. http://dx.doi.org/10.1080/01611190508951315.
Texto completo da fontePatterson, Wayne. "The Cryptology of Baseball". Cryptologia 35, n.º 2 (31 de março de 2011): 156–63. http://dx.doi.org/10.1080/01611194.2011.558979.
Texto completo da fonteVarnovsky, N. P., A. I. Verchenko e E. A. Primenko. "Mathematical problems in cryptology". Journal of Soviet Mathematics 67, n.º 6 (dezembro de 1993): 3373–406. http://dx.doi.org/10.1007/bf01096271.
Texto completo da fonteKRUH, LOUIS. "CRYPTOLOGY AND THE LAW - III". Cryptologia 9, n.º 3 (julho de 1985): 273–85. http://dx.doi.org/10.1080/0161-118591860003.
Texto completo da fonteTeses / dissertações sobre o assunto "Applied cryptology"
Souza, Gwendolyn Rae. "The Evolution of Cryptology". CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/572.
Texto completo da fonteKeuffer, Julien. "Calcul vérifiable et vérification biométrique". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS156.
Texto completo da fonteThis thesis deals with the notion of verifiable computation, which aims at adding a proof of correctness to the result of a computation. Besides, verifying the proof should be more efficient than executing it. Verifiable computation protocols pave the way for delegation of computations to an untrusted party. The first part of this thesis introduces the background required to understand the most important verifiable computation protocols and describes their construction. Many protocols have been proposed since 2012 and some are nearly practical, but the prover often lacks efficiency. Even though several specialized protocols are very efficient, it seems more appropriate to consider protocols that can verify a large class of computations, in order to avoid the multiplications of proofs for each sub-computation. In the second part of this thesis, we leverage proof composition to obtain a non-interactive verifiable computation protocol with a more efficient prover while keeping the expressiveness of the scheme. Some of the existing verifiable computation systems reach additional properties and provide zero-knowledge for the proof with little overhead for the prover. We propose two applications that leverage this property to design new primitives. This first one enables to modify a signed document while keeping a form of authenticity. The second one allows for a privacy-preserving biometric authentication
Livros sobre o assunto "Applied cryptology"
service), SpringerLink (Online, ed. Applied Informatics and Communication: International Conference, ICAIC 2011, Xi’an, China, August 20-21, 2011, Proceedings, Part V. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Encontre o texto completo da fonteR, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2a ed. New York: M. Dekker, 2000.
Encontre o texto completo da fonteR, Hankerson Darrel, ed. Coding theory and cryptography: The essentials. 2a ed. New York: M. Dekker, 2000.
Encontre o texto completo da fonteS, DeSilva Christopher J., ed. Fundamentals of information theory and coding design. Boca Raton, FL: Chapman & Hall/CRC, 2002.
Encontre o texto completo da fonteApplied Informatics And Communication. Springer, 2011.
Encontre o texto completo da fonteApplied Informatics And Communication. Springer, 2011.
Encontre o texto completo da fonteApplied Informatics and Communication Part 2 Communications in Computer and Information Science. Springer, 2011.
Encontre o texto completo da fonteHoffman, Gary, D. C. Hankerson, D. A. Leonard, K. T. Phelps, C. A. Rodger, J. R. Wall e Charles C. Lindner. Coding Theory and Cryptography: The Essentials, Second Edition, Revised and Expanded (Pure and Applied Mathematics). 2a ed. CRC, 2000.
Encontre o texto completo da fonteApplied Informatics And Communication International Conference Icaic 2011 Xian China August 2021 2011 Proceedings. Springer, 2011.
Encontre o texto completo da fonteHoffman, Gary, K. T. Phelps, Charles C. Lindner, D. A. Leonard e D. C. Hankerson. Coding Theory and Cryptography: The Essentials, Second Edition. Taylor & Francis Group, 2000.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Applied cryptology"
Li, Xiangxi, Yu Zhang e Yuxin Deng. "Verifying Anonymous Credential Systems in Applied Pi Calculus". In Cryptology and Network Security, 209–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10433-6_14.
Texto completo da fonteJoux, Antoine. "A Tutorial on High Performance Computing Applied to Cryptanalysis". In Advances in Cryptology – EUROCRYPT 2012, 1–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29011-4_1.
Texto completo da fonteYazdani, Hossein, e Kazimierz Choroś. "Comparative Analysis of Accuracy of Fuzzy Clustering Methods Applied for Image Processing". In Cryptology and Network Security, 89–98. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98678-4_11.
Texto completo da fonteBisheh-Niasar, Mojtaba, Reza Azarderakhsh e Mehran Mozaffari-Kermani. "A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates". In Progress in Cryptology – LATINCRYPT 2021, 108–26. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88238-9_6.
Texto completo da fonteAwad, Wasan, e El-Sayed M. El-Alfy. "Computational Intelligence in Cryptology". In Improving Information Security Practices through Computational Intelligence, 28–44. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9426-2.ch002.
Texto completo da fonteAkarsu, Hikmet Temel. "The Art of the Post-Modern Era and the Da Vinci Code". In Architecture in Contemporary Literature, 120–26. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815165166123010016.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Applied cryptology"
Jevremović, Aleksandar, Nenad Ristić e Mladen Veinović. "Using cryptology models for protecting PHP source code". In 11TH INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2013: ICNAAM 2013. AIP, 2013. http://dx.doi.org/10.1063/1.4825491.
Texto completo da fonte