Showing 1 - 20
of 36
for search: '',
query time: 0.08s
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.Narrow Search
Remove Filters
Author: International Conference on the Theory and Application of Cryptology and Information Security
Call Number: Q - Science
Language: English
Subject: Data encryption (Computer science)
Institution
Collection
Format
Subject
Data encryption (Computer science)
27
Computer security
3
Blockchains (Databases)
2
Coding theory
2
Computer science
2
Computer science Mathematics
more ...
2
Computers
2
Management information systems
1
Computer networks
1
Computer networks Access control
1
Computers Access control
1
Cryptography
1
Data protection
1
Information theory
see all ...
less ...
Author
International Conference on the Theory and Application of Cryptology and Information Security
33
SpringerLink (Online service)
6
Guo, Jian,
6
International Conference on the Theory and Application of Cryptology and Information Security Guangzhou, China)
6
Steinfeld, Ron,
5
International Conference on the Theory and Application of Cryptology and Information Security Online)
more ...
5
Takagi, Tsuyoshi (Mathematician)
4
Agrawal, Shweta,
4
Cheon, Jung Hee,
4
International Conference on the Theory and Application of Cryptology and Information Security Taipei, Taiwan)
4
Iwata, Tetsu,
4
Lin, Dongdai,
4
Peyrin, Thomas,
4
Sarkar, Palash, 1969-
4
Tibouchi, Mehdi,
4
Wang, Huaxiong,
3
Galbraith, Steven D.
3
International Conference on the Theory and Application of Cryptology and Information Security Hong Kong, China)
3
International Conference on the Theory and Application of Cryptology and Information Security Kobe, Japan)
3
Moriai, Shiho
3
Moriai, Shiho,
3
Sako, Kazue (Innovation Producer)
3
Wang, Huaxiong
2
International Association for Cryptologic Research,
2
International Conference on the Theory and Application of Cryptology and Information Security Auckland, N.Z.)
2
International Conference on the Theory and Application of Cryptology and Information Security Bangalore, India)
2
International Conference on the Theory and Application of Cryptology and Information Security Hanoi, Vietnam)
2
International Conference on the Theory and Application of Cryptology and Information Security Kaohsiung City, Taiwan)
2
Wang, Xiaoyun, 1966-
1
Galbraith, Steven D.,
see all ...
less ...
Language
Literary Form
Call Number
Year of Publication