基本信息
浏览量:308
职业迁徙
个人简介
Field of Study
Cryptology and Information Security : Theory and its Practice
– Secret Key Cryptosystem / Public Key Cryptosystem
– Elliptic Curve Cryptosystem
– Key Management / Random Number Generation/PUF
– Digital Signature / Cryptographic Protocol
– Access Control / Identification and Authentication
– Electronic Cash / Electronic Payment / Electronic Commerce
– Smart Card and Secure PDA / Tamper Resistant Software/ Side Channel Attack
– Cryptanalysis / Auditing
– Risk Management and Risk Assessment
– Digital Watermark / Intellectual Property Protection
– Firewall / Intrusion and Detection / Virus and Worm / Information Warfare
– Cryptography / Steganography
– Complexity Theory / Computational Number Theory
– Network Security / Computer Security / Information Security / Communication Security / OS Security / Data Base Security/ Embedded Security/Ubiquitous Secuity
– RFID/USN Security/Smart Grid Security/ Cyber Security/ Mobile Security, etc.
– Blockchain / Cryptocurrency
研究兴趣
论文共 389 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
Muhamad Erza Aminanto, R. Satrio Hariomurti Wicaksono,Achmad Eriza Aminanto,Harry Chandra Tanuwidjaja,Lin Yola,Kwangjo Kim
Privacy-Preserving Deep LearningSpringerBriefs on Cyber Security Systems and Networkspp.55-63, (2021)
Privacy-Preserving Deep LearningSpringerBriefs on Cyber Security Systems and Networkspp.45-53, (2021)
user-61447a76e55422cecdaf7d19(2021)
引用0浏览0引用
0
0
user-61447a76e55422cecdaf7d19(2021)
引用0浏览0引用
0
0
Privacy-Preserving Deep Learningpp.65-71, (2021)
Privacy-Preserving Deep LearningSpringerBriefs on Cyber Security Systems and Networkspp.23-44, (2021)
user-61447a76e55422cecdaf7d19(2021)
引用1浏览0引用
1
0
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn