Temes suggerits dins de la cerca
Temes suggerits dins de la cerca
Alternatives de cerca:
functionals generalized » functional generalized, functions generalized, fractional generalized
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
generalized https » generalized hyers, generalized atoms, generalized hat
functionals generalized » functional generalized, functions generalized, fractional generalized
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
generalized https » generalized hyers, generalized atoms, generalized hat
1
per Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Publicat 2014
Taula de continguts:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Publicat 2014
Obtenir text complet
Electrònic
eBook
2
Taula de continguts:
“...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...”
Obtenir text complet
Obtenir text complet
Electrònic
eBook
3
Matèries:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”
Obtenir text complet
Obtenir text complet
Electrònic
eBook
4
Publicat 2008
Taula de continguts:
“... and Application of UV Excimer Lamps in Nanofabrication -- Functionalization of Semiconductor Nanoparticles...”Obtenir text complet
Electrònic
eBook
5
per Hajek, Petr., Hajek, Petr., Montesinos Santalucia, Vicente., Vanderwerff, Jon., Zizler, Vaclav.
Publicat 2008
Matèries:
“...Functional Analysis. https://scigraph.springernature.com/ontologies/product-market-codes/M12066...”Publicat 2008
Obtenir text complet
Electrònic
eBook
6
Publicat 2013
Taula de continguts:
“... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...”Obtenir text complet
Electrònic
eBook
7
Publicat 2015
Taula de continguts:
“..., Philanthropy, and Human Security: Concepts, and Contexts- Samiul Hasan -- Chapter 2: Human Security in A...”Obtenir text complet
Electrònic
eBook
8
Publicat 2008
Taula de continguts:
“... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...”Obtenir text complet
Electrònic
eBook
9
Publicat 2008
Taula de continguts:
“... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...”Obtenir text complet
Electrònic
eBook
10
Publicat 2007
Taula de continguts:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”Obtenir text complet
Electrònic
eBook
11
Publicat 2014
Taula de continguts:
“... for Sustainable Food Security and Eco-System -- 36. PCR Amplification, Sequencing and Insilico Characterization...”Obtenir text complet
Electrònic
eBook
12
Publicat 2012
Taula de continguts:
“... and Environmental Security: The Dietary Grape Polyphenol Concentrate Enoant as Functional Food in Prevention...”Obtenir text complet
Electrònic
eBook
13
Publicat 2010
Taula de continguts:
“... in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key...”Obtenir text complet
Electrònic
eBook
14
Publicat 2005
Taula de continguts:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”Obtenir text complet
Electrònic
eBook
15
Publicat 2013
Taula de continguts:
“...1. Introduction: The Food Security Problem in Australia -- Part I. Food Equity and Access -- 2...”Obtenir text complet
Electrònic
eBook
16
Publicat 2008
Taula de continguts:
“... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...”Obtenir text complet
Electrònic
eBook
17
Publicat 2008
Taula de continguts:
“... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...”Obtenir text complet
Electrònic
eBook
18
Publicat 2012
Taula de continguts:
“... Break Ends; M.A. Resnick -- Facultativeness Principle And Generalized Approach To The Genome...”Obtenir text complet
Electrònic
eBook
19
Publicat 2005
Taula de continguts:
“... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...”Obtenir text complet
Electrònic
eBook
20
Publicat 2006
Taula de continguts:
“...) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment...”Obtenir text complet
Electrònic
eBook



