gi-ev.org
WEWoRC - Western European Workshop on Research in Cryptology
http://www.gi-ev.org/index.html
Western European Workshop on Research in Cryptology. July 4-6, 2007. WEWoRC is a research meeting in the field of cryptology with a specific focus on young researchers. Topics of interest include, but are not limited to, the following. Foundations of cryptology (e.g., from computational number theory, complexity theory, combinatorics). Secret-key cryptosystems and hash functions. Modes of operation (e.g., Authenticated encryption and signcryption). Secure operating systems and trusted computing. Use unzi...
datenbank-spektrum.de
WEWoRC - Western European Workshop on Research in Cryptology
http://datenbank-spektrum.de/index.html
Western European Workshop on Research in Cryptology. July 4-6, 2007. WEWoRC is a research meeting in the field of cryptology with a specific focus on young researchers. Topics of interest include, but are not limited to, the following. Foundations of cryptology (e.g., from computational number theory, complexity theory, combinatorics). Secret-key cryptosystems and hash functions. Modes of operation (e.g., Authenticated encryption and signcryption). Secure operating systems and trusted computing. Use unzi...
businessappsindustry.de
Business Applications for the Mobile World e.V. - Industry - News
http://www.businessappsindustry.de/news.php
Das Kompetenznetzwerk für moderne Geschäftsanwendungen. Alle News im Bereich Industry. Deep Tech Award 2016 verliehen. 1 Platz: "4D MMS Vision-System" der PTX tech GmbH (20.000 Euro). Den 1 Platz belegte das "4D MMS Vision-System" der PTX tech GmbH. 2 Platz: Lösung "Factor-E Analytics" der Factor-E-Analytics GmbH (15.000 Euro). 2 Platz: Wearable "SmarKo" der MCS DataLabs GmbH (15.000 Euro). In der gegenwärtigen Version ist "SmarKo" der MCS DataLabs GmbH. Cassantec Prognostics der Cassantec GmbH. Der Deep...
fg-bil.gi-ev.de
WEWoRC - Western European Workshop on Research in Cryptology
http://fg-bil.gi-ev.de/index.html
Western European Workshop on Research in Cryptology. July 4-6, 2007. WEWoRC is a research meeting in the field of cryptology with a specific focus on young researchers. Topics of interest include, but are not limited to, the following. Foundations of cryptology (e.g., from computational number theory, complexity theory, combinatorics). Secret-key cryptosystems and hash functions. Modes of operation (e.g., Authenticated encryption and signcryption). Secure operating systems and trusted computing. Use unzi...
konrad-zuse-gesellschaft.gi-ev.de
WEWoRC - Western European Workshop on Research in Cryptology
http://konrad-zuse-gesellschaft.gi-ev.de/index.html
Western European Workshop on Research in Cryptology. July 4-6, 2007. WEWoRC is a research meeting in the field of cryptology with a specific focus on young researchers. Topics of interest include, but are not limited to, the following. Foundations of cryptology (e.g., from computational number theory, complexity theory, combinatorics). Secret-key cryptosystems and hash functions. Modes of operation (e.g., Authenticated encryption and signcryption). Secure operating systems and trusted computing. Use unzi...
fg-ir.de
WEWoRC - Western European Workshop on Research in Cryptology
http://www.fg-ir.de/index.html
Western European Workshop on Research in Cryptology. July 4-6, 2007. WEWoRC is a research meeting in the field of cryptology with a specific focus on young researchers. Topics of interest include, but are not limited to, the following. Foundations of cryptology (e.g., from computational number theory, complexity theory, combinatorics). Secret-key cryptosystems and hash functions. Modes of operation (e.g., Authenticated encryption and signcryption). Secure operating systems and trusted computing. Use unzi...
girls-go-informatik.de
WEWoRC - Western European Workshop on Research in Cryptology
http://girls-go-informatik.de/index.html
Western European Workshop on Research in Cryptology. July 4-6, 2007. WEWoRC is a research meeting in the field of cryptology with a specific focus on young researchers. Topics of interest include, but are not limited to, the following. Foundations of cryptology (e.g., from computational number theory, complexity theory, combinatorics). Secret-key cryptosystems and hash functions. Modes of operation (e.g., Authenticated encryption and signcryption). Secure operating systems and trusted computing. Use unzi...