Siddhartha Medical College — India · Computer Science
IoT and Edge/Fog Computing, Blockchain Technology Applications and Security, Vehicular Ad Hoc Networks (VANETs), Advanced Authentication Protocols Security, Cryptography and Data Security
Health Information Management — Belgium · Computer Science
Logic, programming, and type systems, Security and Verification in Computing, Advanced Authentication Protocols Security, Cryptography and Data Security, Distributed systems and fault tolerance
Allen Institute for Brain Science — United States · Computer Science
Advanced Authentication Protocols Security, Genomics and Chromatin Dynamics, RNA modifications and cancer, Cancer Genomics and Diagnostics, Single-cell and spatial transcriptomics
Boston University — United States · Computer Science
Cryptography and Data Security, Advanced Authentication Protocols Security, Cryptographic Implementations and Security, Complexity and Algorithms in Graphs, User Authentication and Security Systems
West Virginia University — United States · Computer Science
User Authentication and Security Systems, Advanced Authentication Protocols Security, Cryptography and Data Security, Biometric Identification and Security, Microgrid Control and Optimization
University of California, Davis — United States · Computer Science
Cryptographic Implementations and Security, Cryptography and Data Security, Chaos-based Image/Signal Encryption, Coding theory and cryptography, Advanced Authentication Protocols Security
University of Calcutta — India · Computer Science
Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security, Blockchain Technology Applications and Security, Security in Wireless Sensor Networks
The University of Texas MD Anderson Cancer Center — United States · Computer Science
Logic, programming, and type systems, Security and Verification in Computing, Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security
Central South University — China · Computer Science
Cryptography and Data Security, Privacy-Preserving Technologies in Data, Cloud Data Security Solutions, Complexity and Algorithms in Graphs, Advanced Authentication Protocols Security
Qilu University of Technology — China · Computer Science
Cryptography and Data Security, Advanced Authentication Protocols Security, Privacy-Preserving Technologies in Data, Blockchain Technology Applications and Security, User Authentication and Security Systems
University of Cambridge — United Kingdom · Computer Science
Cryptographic Implementations and Security, User Authentication and Security Systems, Advanced Authentication Protocols Security, Advanced Malware Detection Techniques, Information and Cyber Security
Amazon (United States) — United States · Computer Science
Cryptography and Data Security, Advanced Authentication Protocols Security, Cryptographic Implementations and Security, User Authentication and Security Systems, Chaos-based Image/Signal Encryption
Universidad de Valladolid — Spain · Computer Science
Mobile Ad Hoc Networks, Energy Efficient Wireless Sensor Networks, IoT and Edge/Fog Computing, Advanced Authentication Protocols Security, User Authentication and Security Systems
Chaos-based Image/Signal Encryption, Cryptography and Data Security, Intelligence, Security, War Strategy, Cryptographic Implementations and Security, Advanced Authentication Protocols Security
Unknown · Computer Science
Cryptography and Data Security, Privacy-Preserving Technologies in Data, Internet Traffic Analysis and Secure E-voting, Advanced Authentication Protocols Security, Complexity and Algorithms in Graphs
Centre National de la Recherche Scientifique — France · Computer Science
Cryptography and Data Security, Cryptographic Implementations and Security, Advanced Authentication Protocols Security, Chaos-based Image/Signal Encryption, Complexity and Algorithms in Graphs
Sinopec (China) — China · Computer Science
Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security, Privacy-Preserving Technologies in Data, Vehicular Ad Hoc Networks (VANETs)
Nanjing University of Chinese Medicine — China · Computer Science
Chitkara University — India · Computer Science
Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security, Biometric Identification and Security, Blockchain Technology Applications and Security
Beijing Union University — China · Computer Science
Cryptography and Data Security, Privacy-Preserving Technologies in Data, Advanced Authentication Protocols Security, User Authentication and Security Systems, Cloud Data Security Solutions
United States Naval Research Laboratory — United States · Computer Science
Internet Traffic Analysis and Secure E-voting, Cryptography and Data Security, Network Security and Intrusion Detection, Advanced Authentication Protocols Security, User Authentication and Security Systems
ETH Zurich — Switzerland · Computer Science
Formal Methods in Verification, Logic, programming, and type systems, Advanced Authentication Protocols Security, Security and Verification in Computing, Access Control and Trust
Cryptography and Data Security, Cryptographic Implementations and Security, Coding theory and cryptography, Advanced Authentication Protocols Security, Chaos-based Image/Signal Encryption
Union Hospital — China · Computer Science
Cryptography and Data Security, Privacy-Preserving Technologies in Data, Complexity and Algorithms in Graphs, Cryptographic Implementations and Security, Advanced Authentication Protocols Security
Beijing Institute of Technology — China · Computer Science
Cryptography and Data Security, Cloud Data Security Solutions, Privacy-Preserving Technologies in Data, Advanced Authentication Protocols Security, User Authentication and Security Systems