Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
parallel computers » parallel computing
computers security » computer security, computing security
security function » security functions, security functional, security fiction
function function » function functional, functions functional, function dysfunction
function https » functions https, fiction https
parallel computers » parallel computing
computers security » computer security, computing security
security function » security functions, security functional, security fiction
function function » function functional, functions functional, function dysfunction
function https » functions https, fiction https
1
Tabla de Contenidos:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
Enlace del recurso
Enlace del recurso
Electrónico
eBook
2
Publicado 2005
Tabla de Contenidos:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”Enlace del recurso
Electrónico
eBook
3
Publicado 2013
Tabla de Contenidos:
“... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...”Enlace del recurso
Electrónico
eBook
4
Publicado 2012
Tabla de Contenidos:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”Enlace del recurso
Electrónico
eBook
5
Publicado 2015
Tabla de Contenidos:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”Enlace del recurso
Electrónico
eBook
6
Tabla de Contenidos:
“...Introduction -- Preliminaries and Definitions -- Randomized Encoding of Functions -- Cryptography...”
Enlace del recurso
Enlace del recurso
Electrónico
eBook
7
Publicado 2008
Tabla de Contenidos:
“... Behaviour -- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple...”Enlace del recurso
Electrónico
eBook
8
Publicado 2010
Tabla de Contenidos:
“...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...”Enlace del recurso
Electrónico
eBook
9
Publicado 2010
Tabla de Contenidos:
“... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...”Enlace del recurso
Electrónico
eBook
10
Publicado 2010
Tabla de Contenidos:
“... Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation...”Enlace del recurso
Electrónico
eBook
11
Publicado 2006
Tabla de Contenidos:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”Enlace del recurso
Electrónico
eBook
12
Publicado 2005
Tabla de Contenidos:
“... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...”Enlace del recurso
Electrónico
eBook
13
Publicado 2006
Tabla de Contenidos:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”Enlace del recurso
Electrónico
eBook
14
Publicado 2006
Tabla de Contenidos:
“... Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security...”Enlace del recurso
Electrónico
eBook
15
Publicado 2007
Tabla de Contenidos:
“...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...”Enlace del recurso
Electrónico
eBook
16
Publicado 2012
Tabla de Contenidos:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”Enlace del recurso
Electrónico
eBook
17
Publicado 2015
Tabla de Contenidos:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”Enlace del recurso
Electrónico
eBook
18
Publicado 2010
Tabla de Contenidos:
“...Theory of Evolutionary Computing (I) -- Optimal Fixed and Adaptive Mutation Rates...”Enlace del recurso
Electrónico
eBook
19
Publicado 2010
Tabla de Contenidos:
“... on Power Supply Line -- Data Integration in Computer Distributed Systems -- Load Balancing...”Enlace del recurso
Electrónico
eBook
20
Publicado 2013
Tabla de Contenidos:
“... Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer...”Enlace del recurso
Electrónico
eBook



