1
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...
View full text
Electronic eBook
3
Published 2013
Table of Contents: ... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...
View full text
Electronic eBook
6
Table of Contents: ...Introduction -- Preliminaries and Definitions -- Randomized Encoding of Functions -- Cryptography...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... Behaviour -- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... Linear Array -- Parallel Prefix Computation in the Recursive Dual-Net -- A Two-Phase Differential...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation...
View full text
Electronic eBook
11
Published 2006
Table of Contents: ... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ... Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...
View full text
Electronic eBook
16
Published 2012
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ...Theory of Evolutionary Computing (I) -- Optimal Fixed and Adaptive Mutation Rates...
View full text
Electronic eBook
19
Published 2013
Table of Contents: ... Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer...
View full text
Electronic eBook
20
Published 2013
Table of Contents: ... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...
View full text
Electronic eBook