يعرض 1 - 10 نتائج من 36 نتيجة بحث عن '"Cryptographic Puzzles"', وقت الاستعلام: 0.92s تنقيح النتائج
  1. 1
    مؤتمر

    المصدر: 2019 IEEE Congress on Evolutionary Computation (CEC) Evolutionary Computation (CEC), 2019 IEEE Congress on. :771-776 Jun, 2019

    Relation: 2019 IEEE Congress on Evolutionary Computation (CEC)

  2. 2
    مؤتمر

    المؤلفون: Abliz, Mehmud, Znati, Taieb F.

    المصدر: 2015 International Conference on Information Systems Security and Privacy (ICISSP) Information Systems Security and Privacy (ICISSP), 2015 International Conference on. :114-123 Feb, 2015

    Relation: 2015 International Conference on Information Systems Security and Privacy (ICISSP)

  3. 3
    مؤتمر

    المصدر: 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) Intelligent Systems and Control (ISCO), 2015 IEEE 9th International Conference on. :1-6 Jan, 2015

    Relation: 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO)

  4. 4
    مؤتمر

    المصدر: 2012 Fourth International Conference on Computational Intelligence and Communication Networks Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on. :535-539 Nov, 2012

    Relation: 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN)

  5. 5
    مؤتمر

    المصدر: 2010 IEEE International Conference on Information Theory and Information Security Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on. :568-573 Dec, 2010

    Relation: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS)

  6. 6
    مؤتمر

    المصدر: 2010 IEEE International Conference on RFID (IEEE RFID 2010) RFID, 2010 IEEE International Conference on. :45-52 Apr, 2010

    Relation: 2010 IEEE International Conference on RFID (IEEE RFID 2010)

  7. 7
    دورية أكاديمية

    لا يتم عرض هذه النتيجة على الضيوف.

  8. 8
    مؤتمر

    المؤلفون: Abliz, Mehmud, Znati, Taieb

    المصدر: 2009 Annual Computer Security Applications Conference Computer Security Applications Conference, 2009. ACSAC '09. Annual. :279-288 Dec, 2009

    Relation: 2009 Annual Computer Security Applications Conference (ACSAC)

  9. 9
    كتاب إلكتروني

    المؤلفون: Lundbæk, Leif-NissenAff19, Callia D’Iddio, AndreaAff19, Huth, MichaelAff19

    المساهمون: Hutchison, David, Series editorAff1, Kanade, Takeo, Series editorAff2, Kittler, Josef, Series editorAff3, Kleinberg, Jon M., Series editorAff4, Mattern, Friedemann, Series editorAff5, Mitchell, John C., Series editorAff6, Naor, Moni, Series editorAff7, Pandu Rangan, C., Series editorAff8, Steffen, Bernhard, Series editorAff9, Terzopoulos, Demetri, Series editorAff10, Tygar, Doug, Series editorAff11, Weikum, Gerhard, Series editorAff12, Aceto, Luca, editorAff13, Bacci, Giorgio, editorAff14, Bacci, Giovanni, editorAff15, Ingólfsdóttir, Anna, editorAff16, Legay, Axel, editorAff17, Mardare, Radu, editorAff18

    المصدر: Models, Algorithms, Logics and Tools : Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday. 10460:578-599

  10. 10