Mots-clés
authentication
key management
privacy and authentication
cryptographic protocols
fuzzy systems
wireless network security
security management
trust management
untraceability
information hiding
data integrity
biometric security
computational intelligence in security
quantum cryptography
cryptography and coding
Tout plus
Documents
(3)Mots-clés
authentication
key management
privacy and authentication
cryptographic protocols
fuzzy systems
wireless network security
security management
trust management
untraceability
information hiding
data integrity
biometric security
computational intelligence in security
quantum cryptography
cryptography and coding
Tout plus