Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function attacking » functions attacking, function tracking, function making
forms computing » form computing, formulas computing, forms conducting
attacking https » teaching https
https function » its function, sites function, ups function
function attacking » functions attacking, function tracking, function making
forms computing » form computing, formulas computing, forms conducting
attacking https » teaching https
https function » its function, sites function, ups function
1
Published 2014
Table of Contents:
“... -- Structural Biology of the Membrane Attack Complex -- Part III: Functional aspect -- Membrane Interactions...”View full text
Electronic
eBook
2
Published 2015
Table of Contents:
“...Computers and the Mechanics of Communication. Outline of a Vision from the Work of Petri and Holt...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“...Algorithms and Implementations -- Computing the Minkowski Value of the Exponential Function over a...”View full text
Electronic
eBook
4
Computer Mathematics 9th Asian Symposium (ASCM2009), Fukuoka, December 2009, 10th Asian Symposium...
Published 2014
Table of Contents:
“... -- The Diagonal Reduction Algorithm Using Fast Givens -- Constructing Generalized Bent Functions from Trace Forms...”View full text
Electronic
eBook
5
Table of Contents:
“... -- PAF in multiple sclerosis -- PAF in Miller-Dieker lissencephaly -- PAF in migraine attacks -- PAF...”
View full text
View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“...Power Aware Computing -- Real-Time Loop Scheduling with Energy Optimization Via DVS and ABB...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...”View full text
Electronic
eBook
9
Published 2013
Table of Contents:
“...-compensation for Visually Impaired Computer Users with Variable Pupil Size -- Digital Filtering of the Pupil...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“...Computational Study of Blood Flow through Elastic Arteries with Porous Effects -- A Modified...”View full text
Electronic
eBook
11
Published 2007
Table of Contents:
“... Symbolic Intruder Model for Hash-Collision Attacks -- A Denotational Approach to Scope-Based Compensable...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... -- Cryptography Based on Quadratic Forms: Complexity Considerations -- Towards a Concrete Security Proof...”View full text
Electronic
eBook
13
Published 2014
Table of Contents:
“... -- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited -- Hash Functions -- Differential Biases in Reduced...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“...-Synchronizing Stream Ciphers -- Algebraic Attacks over GF(q) -- Cryptographic Boolean Functions -- Results...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“...Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Applications -- Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks -- A Closed Form Slew Evaluation...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... -- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions -- Dual Form...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“... Permutation -- Hash Function Cryptanalysis (I) -- Second Preimage Attack on 3-Pass HAVAL and Partial Key...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... for Elliptic Curves -- Efficient Pairing Computation with Theta Functions -- Small-Span Characteristic...”View full text
Electronic
eBook



