搜索结果: 1-10 共查到“工学 Cryptography”相关记录10条 . 查询时间(0.098 秒)
第四届ACM亚洲公钥密码学研讨会(The 4th ACM ASIA Public-Key Cryptography Workshop)(APKC 2017)
第四届 ACM亚洲公钥密码学 研讨会
2017/3/31
Public key cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. The theme of this workshop is novel public key cryptosystems for solv...
2017年第一届ACM加密安全与隐私国际会议(2017 International Conference on Cryptography,Security and Privacy)
2017年 第一届 ACM加密安全与隐私 国际会议
2017/1/10
Welcome to the official website of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP 2017, will be held during March 17-19, 2017, in Wuhan, China. ICCSP 2017, aims to bri...
The Workshop on Public Key Cryptography (PKC) been sponsored by the IACR since 2003. PKC has been the main annual conference focusing on all aspects of public-key cryptography, attracting cutting-edge...
Fourteenth IACR Theory of Cryptography Conference - TCC 2016-B
information security cryptology,
2016/7/19
The Fourteenth Theory of Cryptography Conference (TCC 2016-B) will be held in Beijing, China, from Oct. 31 to Nov. 3, 2016, and it will take place at Beijing Friendship Hotel, Beijing, China.
2016 13th International Conference on Security and Cryptography (SECRYPT)
information communication security
2016/7/19
SECRYPT is an annual international conference covering research in information and communication security. The 13th International Conference on Security and Cryptography (SECRYPT 2016) will be held in...
Cryptography with Streaming Algorithms
streaming lower bound big data randomized encoding non-black-box PRG PKE
2016/1/22
We put forth the question of whether cryptography is fea-sible using streaming devices. We give constructions and prove lower bounds. In streaming cryptography (not to be confused with stream-ciphers)...
We study the problem of finding efficiently computable non-degenerate multilinear maps from G1n to G2, where G1 and G2 are groups of the same prime order, and where computing discrete logarithms in G1...
An application-oriented hierarchical quantum cryptography network test bed
Quantum cryptography Fiber optics communications Networks Quantum communications
2015/6/9
A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this paper. The techniques of the quantum router, optical switch and trusted...
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
Network Security Military Ad-hoc network Cryptography Signcryption Multi-tiered Structures
2010/10/12
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information ...
ACNS'10 The 8th Internation Conference on Applied Cryptography and Network Security
ACNS'10 8th Conference Applied Cryptography Network Security
2010/1/14
ACNS’10, the 8th International Conference on Applied Cryptography and Network Security, will be held in Beijing, the capital of China in 2010. With 7 times’ successful holding experiences, the confere...