Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
problems functionality » protein functionality, problem functional, problem functionals
computing problems » compounding problems, routing problems, computers problems
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
problems functionality » protein functionality, problem functional, problem functionals
computing problems » compounding problems, routing problems, computers problems
securing https » security https, security http, securing rtp
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“...Theory of Evolutionary Computing (I) -- Optimal Fixed and Adaptive Mutation Rates...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...”View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“... Generators -- Open Problems on Binary Bent Functions -- On Semi-bent functions and Related Plateaued...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...”View full text
Electronic
eBook
11
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“... Multidimensional Feature Vectors -- A Virtualized Architecture for Secure Database Management in Cloud Computing...”View full text
Electronic
eBook
14
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“... Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... for Integrated Operations -- Cloud Service Solving N-Body Problem Based on Windows Azure Platform...”View full text
Electronic
eBook
17
Published 2014
Table of Contents:
“... and Chemical Networks -- Speed Faults in Computation by Chemical Reaction Networks -- Fault-Tolerant ANTS...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Discriminant Analysis and RBF Neural Network -- Parallel Enumeration Sort on OTIS-Hypercube -- A Robust Trust...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... to #CSP and Back: Dichotomy for Holant c Problems -- Computing Sparse Multiples of Polynomials -- Fractal...”View full text
Electronic
eBook
20
Published 2015
Table of Contents:
“... -- Hierarchical Dynamic Power-Gating in FPGAs -- Tools and Compilers -- Hardware Synthesis from Functional...”View full text
Electronic
eBook



