1
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
Ligazón do recurso
Electrónico eBook
2
Publicado 2013
Table of Contents: ... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...
Ligazón do recurso
Electrónico eBook
3
Publicado 2005
Table of Contents: ... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...
Ligazón do recurso
Electrónico eBook
4
por Applebaum, Benny., Applebaum, Benny.
Publicado 2014
Table of Contents: ...Introduction -- Preliminaries and Definitions -- Randomized Encoding of Functions -- Cryptography...
Ligazón do recurso
Electrónico eBook
5
Publicado 2010
Table of Contents: ... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...
Ligazón do recurso
Electrónico eBook
6
Publicado 2010
Table of Contents: ...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...
Ligazón do recurso
Electrónico eBook
7
Publicado 2007
Table of Contents: ...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...
Ligazón do recurso
Electrónico eBook
8
Publicado 2010
Table of Contents: ... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...
Ligazón do recurso
Electrónico eBook
9
Publicado 2012
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
Ligazón do recurso
Electrónico eBook
10
Publicado 2015
Table of Contents: ... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...
Ligazón do recurso
Electrónico eBook
11
Publicado 2006
Table of Contents: ... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...
Ligazón do recurso
Electrónico eBook
12
Publicado 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
Ligazón do recurso
Electrónico eBook
13
Publicado 2006
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...
Ligazón do recurso
Electrónico eBook
14
Publicado 2015
Table of Contents: ...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...
Ligazón do recurso
Electrónico eBook
15
Publicado 2013
Table of Contents: ...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...
Ligazón do recurso
Electrónico eBook
16
Publicado 2010
Table of Contents: ... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...
Ligazón do recurso
Electrónico eBook
17
Publicado 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
Ligazón do recurso
Electrónico eBook
18
Publicado 2013
Table of Contents: ... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...
Ligazón do recurso
Electrónico eBook
19
Publicado 2008
Table of Contents: ... Behaviour -- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple...
Ligazón do recurso
Electrónico eBook
20
Publicado 2006
Table of Contents: ... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...
Ligazón do recurso
Electrónico eBook