Search alternatives:
function attacking » functions attacking, function tracking, function making
forms computing » form computing, formulas computing, forms conducting
attacking https » teaching https
https function » its function, sites function, ups function
1
Published 2014
Table of Contents: ... -- Structural Biology of the Membrane Attack Complex -- Part III: Functional aspect --  Membrane Interactions...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ...Computers and the Mechanics of Communication. Outline of a Vision from the Work of Petri and Holt...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ...Algorithms and Implementations -- Computing the Minkowski Value of the Exponential Function over a...
View full text
Electronic eBook
4
Published 2014
Table of Contents: ... -- The Diagonal Reduction Algorithm Using Fast Givens -- Constructing Generalized Bent Functions from Trace Forms...
View full text
Electronic eBook
5
Table of Contents: ... -- PAF in multiple sclerosis -- PAF in Miller-Dieker lissencephaly -- PAF in migraine attacks -- PAF...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ...Power Aware Computing -- Real-Time Loop Scheduling with Energy Optimization Via DVS and ABB...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...
View full text
Electronic eBook
9
Published 2013
Table of Contents: ...-compensation for Visually Impaired Computer Users with Variable Pupil Size -- Digital Filtering of the Pupil...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ...Computational Study of Blood Flow through Elastic Arteries with Porous Effects -- A Modified...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... Symbolic Intruder Model for Hash-Collision Attacks -- A Denotational Approach to Scope-Based Compensable...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... -- Cryptography Based on Quadratic Forms: Complexity Considerations -- Towards a Concrete Security Proof...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... -- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited -- Hash Functions -- Differential Biases in Reduced...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ...-Synchronizing Stream Ciphers -- Algebraic Attacks over GF(q) -- Cryptographic Boolean Functions -- Results...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ...Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Applications -- Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks -- A Closed Form Slew Evaluation...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... -- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions -- Dual Form...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ... Permutation -- Hash Function Cryptanalysis (I) -- Second Preimage Attack on 3-Pass HAVAL and Partial Key...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... for Elliptic Curves -- Efficient Pairing Computation with Theta Functions -- Small-Span Characteristic...
View full text
Electronic eBook