1
Table of Contents: ... in NC0 -- Computationally Private Randomizing Polynomials and Their Applications -- On Pseudorandom...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... on Highly Parallel Processing on a Chip -- The Next 25 Years of Computer Architecture? -- Software...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
4
Published 2014
Table of Contents: ... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... -- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks -- Protecting...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... -- On the Complexity of Parallel Hardness Amplification for One-Way Functions -- Secret Sharing and Multi-party...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... Crypt -- Cryptography Meets Humans -- Hiding Secret Points Amidst Chaff -- Parallel and Concurrent...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ...: Analysis of Configurations Energy Efficiency -- Functional Readiness of the Security Control System...
View full text
Electronic eBook
11
Published 2011
Table of Contents: ... for Ultra Low-Power Applications -- Proposed of a GIS Cloud (GIS-C) System Architecture in Private Used...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ...-Performance Algorithm Engineering for Large-Scale Graph Problems and Computational Biology -- Contributed...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... -- Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation -- Evolution of Self...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion...
View full text
Electronic eBook
16
Published 2013
Table of Contents: ... Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer...
View full text
Electronic eBook
17
Published 2013
Table of Contents: ... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...
View full text
Electronic eBook
18
Published 2012
Subjects: ...User Interfaces and Human Computer Interaction. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... species -- Small craft and the spread of exotic species -- The environmental impacts of private car...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ..., more functionality -- Challenges facing qualification and management -- Visual management -- From CIO...
View full text
Electronic eBook