1
Published 2013
Table of Contents: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
View full text
Electronic eBook
2
by Horstmann, Cay S.
Published 2013
Subjects: ...Java (Computer program language)....
Cover image
Book
3
Published 2006
Table of Contents: ...-Knowledge Proofs of Knowledge in the Shared Random String Model -- Constrained Minimum Enclosing Circle...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... Fast Search and Its Construction Algorithm Using Optimal Working Space -- Succinct Suffix Arrays Based...
View full text
Electronic eBook