Synonyms were used for: decryption
Search without synonyms: keywords:(decryption)

1–50 of 121 hits
|

    Intelligence Revolution: A Historical Perspective

    S. E. Maffeo | NTIS | 1988
    Keywords: Cryptography

    Packet Telecommand Standard

    NTIS | 1992
    Keywords: Cryptography

    RTPS Telemetry - Simulator Link at Naval Air Warfare Center

    W. G. McNamara / P. Stanley / J. Nichols | NTIS | 1995
    Keywords: Cryptography

    WEDDS: The WITS Encrypted Data Delivery System

    Norris, J. / Backes, P. | NTRS | 1999
    Keywords: public key cryptography encryption authentication distributed operations

    Optical image encryption using interferometry-based phase masks

    Kim, Jong-Yun / Park, Se-Joon / Kim, Cheol-Su et al. | IET Digital Library Archive | 2000
    Keywords: cryptography

    Spatial-domain image hiding using image differencing

    Wu, D.C. / Tsai, W.H. | IET Digital Library Archive | 2000
    Keywords: cryptography

    Data Security Services

    SAE Technical Papers | 2001
    Keywords: Cryptography

    Encrypted Mode Select ADS-B Tactical Military Situational Awareness

    J. R. Jochum | NTIS | 2001
    Keywords: Cryptography

    Client Security in Scalable and Survivable Object Systems

    M. Reiter | NTIS | 2005
    Keywords: Cryptography

    Security and Privacy in Vehicle Safety Communication Applications

    Guo, Jinhua / Baugh, John P. | SAE Technical Papers | 2006
    Keywords: Cryptography

    Secure Feature Activation

    Schramm, Kai / Wolf, Marko | SAE Technical Papers | 2009
    Keywords: Cryptography

    Introduction to Vehicular Embedded Security

    Weimerskirch, André / Wolf, Marko / Wollinger, Thomas | SAE Technical Papers | 2009
    Keywords: Cryptography

    МОДУЛЬ КОМУТАЦІЇ КРИПТОКЛЮЧІВ ДЛЯ ЗАХИЩЕНОЇ СИСТЕМИ ІР-ТЕЛЕФОНІЇ

    Free access
    В.В. Казимир / Є.В. Риндич / Я.Я. Кенійз | DOAJ | 2010
    Keywords: cryptography

    “Verify-on-Demand” - A Practical and Scalable Approach for Broadcast Authentication in Vehicle-to-Vehicle Communication

    Weimerskirch, Andre / Krishnan, Hariharan | SAE Technical Papers | 2011
    Keywords: Cryptography

    Automotive security: Cryptography for Car2X communication

    Schütze, Torsten | Tema Archive | 2011
    Keywords: Entschlüsselung

    Using IBC and Chameleon Hash for the Confidentiality and Message Authentication in VANET

    Yein, Alan Dahgwo / Chen, Cheng Yeh / Hsieh, Wen Shyong | Trans Tech Publications | 2012
    Keywords: Identity-Based Cryptography

    Approaches to a Solution of Key Management System for Cryptography Communications within Railway Applications

    Franeková, Mária / Výrostko, Marek | Springer Verlag | 2012
    Keywords: symmetric cryptography , asymmetric cryptography , Elliptic curve cryptography

    Secure Microprocessor Architectures: Solutions from the Semi-Conductor Industry

    Scheibert, Klaus / Steurich, Björn | Springer Verlag | 2012
    Keywords: Cryptography

    Enterprise High Assurance Scale-Up

    W. R. Simpson / C. Chandersekaran | NTIS | 2012
    Keywords: Cryptography

    Secure Key Management - A Key Feature for Modern Vehicle Electronics

    Weimerskirch, André / Schleiffer, Christian / Wolleschensky, Lars et al. | SAE Technical Papers | 2013
    Keywords: Cryptography

    Design of a Secure Electric Vehicle Charging Pile Control Device

    Zhai, Feng / Liu, Ying / Fu, Yi Lun | Trans Tech Publications | 2013
    Keywords: Decryption

    Achieving higher-fidelity conjunction analyses using cryptography to improve information sharing

    Hemenway, Brett / Welser, William / Baiocchi, Dave | TIBKAT | 2014
    Keywords: Cryptography

    On the Digital Forensics of Heavy Truck Electronic Control Modules

    Kongs, Andrew / Johnson, James / Daily, Jeremy | SAE Technical Papers | 2014
    Keywords: Cryptography

    Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System

    Zhang, Jinrong / Wu, Ling / Liu, Shengli et al. | Springer Verlag | 2014
    Keywords: Error correcting cryptography

    M-Code Benefits and Availability

    Mills T. | NTIS | 2015
    Keywords: Cryptography

    A Security and Privacy Review of VANETs

    Qu, Fengzhong | Online Contents | 2015
    Keywords: Cryptography

    Security of the IC backside

    Free access
    Nedospasov, Dmitry | DataCite | 2015
    Keywords: cryptography

    Use of Field Programmable Gate Arrays (FPGA) in Small Satellite Communication Systems

    K. Varnavas / W. H. Sims / J. Casas | NTIS | 2015
    Keywords: Cryptography

    Configuration Management Data Exchange and Interoperability

    SAE Technical Papers | 2015
    Keywords: Cryptography

    Proposal of on-Line Key Management System Solutions for Railway Applications Based on Asymmetric Cryptography

    Franeková, Mária / Lüley, Peter / Rástočný, Karol et al. | Springer Verlag | 2015
    Keywords: Asymmetric cryptography

    Performance Analysis of Authentication Protocols Used Within Cooperative - Intelligent Transportation Systems with Focus on Security

    Ďurech, Ján / Franeková, Mária / Holečko, Peter et al. | Springer Verlag | 2015
    Keywords: Cryptography algorithms

    Security and Privacy for ITS and C-ITS

    Cadzow, Scott W. | Springer Verlag | 2015
    Keywords: Cryptography

    Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems

    Gisdakis, Stylianos | Online Contents | 2015
    Keywords: cryptography

    GPS Signal Authentication From Cooperative Peers

    Liang Heng | Online Contents | 2015
    Keywords: Cryptography

    Approaches for Secure and Efficient In-Vehicle Key Management

    Vuillaume, Camille / Oka, Dennis Kengo / Sugashima, Takeshi | SAE Technical Papers | 2016
    Keywords: Cryptography

    Analytic Tools for White-box and Lattice Cryptography ; 화이트 박스 및 격자 암호 분석 도구

    Free access
    백충훈 | BASE | 2016
    Keywords: White-box cryptography , Lattice based cryptography

    VANETs: Security Challenges and Future Directions

    Free access
    Jared Oluoch | BASE | 2016
    Keywords: cryptography

    Toward Probabilistic Data Collection in the NOTICE Architecture

    Wang, Xianping | Online Contents | 2016
    Keywords: Cryptography

    Innovative research in attention modeling and computer vision applications

    Pal, Rajarshi | TIBKAT | 2016
    Keywords: Visual cryptography

    Practical Problems Within Safety Related Cryptography Communication Systems Assessment for Safety Critical Applications

    Franeková, Mária / Rástočný, Karol / Lüley, Peter | Springer Verlag | 2016
    Keywords: Cryptography code

    Cyber Safety and Security for Reduced Crew Operations (RCO)

    Driscoll, Kevin | NTRS | 2017
    Keywords: cryptography

    Securing J1939 Communications Using Strong Encryption with FIPS 140-2

    Zachos, Mark | SAE Technical Papers | 2017
    Keywords: Cryptography

    A Balanced Approach for Securing the OBD-II Port

    Chernoguzov, Alex / Markham, Tom R. | SAE Technical Papers | 2017
    Keywords: Cryptography

    Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm

    Zhao, Jian_ning / Li, Qingchen / Zhu, Yuan et al. | SAE Technical Papers | 2017
    Keywords: Cryptography

    Distributed Aggregate Privacy-Preserving Authentication in VANETs

    Zhang, Lei | Online Contents | 2017
    Keywords: Cryptography