Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
computing private » computing privacy, computing primary, computing prace
function function » function functional, functions functional, function dysfunction
private function » private functions, primate functional, prolate functions
function https » functions https, fiction https
computing private » computing privacy, computing primary, computing prace
function function » function functional, functions functional, function dysfunction
private function » private functions, primate functional, prolate functions
function https » functions https, fiction https
1
Table of Contents:
“... in NC0 -- Computationally Private Randomizing Polynomials and Their Applications -- On Pseudorandom...”
View full text
View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... on Highly Parallel Processing on a Chip -- The Next 25 Years of Computer Architecture? -- Software...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...”View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... -- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks -- Protecting...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... -- On the Complexity of Parallel Hardness Amplification for One-Way Functions -- Secret Sharing and Multi-party...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... Crypt -- Cryptography Meets Humans -- Hiding Secret Points Amidst Chaff -- Parallel and Concurrent...”View full text
Electronic
eBook
10
Published 2015
Table of Contents:
“...: Analysis of Configurations Energy Efficiency -- Functional Readiness of the Security Control System...”View full text
Electronic
eBook
11
Published 2011
Table of Contents:
“... for Ultra Low-Power Applications -- Proposed of a GIS Cloud (GIS-C) System Architecture in Private Used...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“...-Performance Algorithm Engineering for Large-Scale Graph Problems and Computational Biology -- Contributed...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... -- Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation -- Evolution of Self...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“... -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
18
Published 2012
Subjects:
“...User Interfaces and Human Computer Interaction. https://scigraph.springernature.com/ontologies...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... species -- Small craft and the spread of exotic species -- The environmental impacts of private car...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“..., more functionality -- Challenges facing qualification and management -- Visual management -- From CIO...”View full text
Electronic
eBook



