Amanote Research
Register
Sign In
Cryptosystems and Information Security in Intranet
doi 10.36059/978-966-397-104-9/139-161
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2019
Authors
O. M. Muliava
Publisher
Liha-Pres
Related search
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Information Security. 1. Information Security and Cryptography.
The Journal of the Institute of Television Engineers of Japan
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Information Security in Bosnia and Herzegovina
FBIM Transactions
Application of Security Information and Event Management Technology for Information Security in Critical Infrastructures
SPIIRAS Proceedings
Control
Systems Engineering
Information Systems
Computer Networks
Applied Mathematics
Mathematics
Communications
Computer Science Applications
Computational Theory
Computational Mathematics
Artificial Intelligence
Special Edition. Recent Information Security. Essential Security Technologies. Introduction to Cryptography and Information Security.
The Journal of the Institute of Television Engineers of Japan
Information Security
International Journal of Science and Research (IJSR)
Information Security and Cryptography. Overview-Revolution of Civilization Structure and Information Security.
The Journal of the Institute of Television Engineers of Japan