Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
security functionality » security functional, obesity functionality, security functions
functionality securing » functionality setting, functionality using, functionality testing
parallel function » parallel functional, parallel auction, parallel union
function security » functions security, nutrition security, aviation security
securing https » security https, security http, securing rtp
security functionality » security functional, obesity functionality, security functions
functionality securing » functionality setting, functionality using, functionality testing
parallel function » parallel functional, parallel auction, parallel union
function security » functions security, nutrition security, aviation security
securing https » security https, security http, securing rtp
1
Table of Contents:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
View full text
View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...”View full text
Electronic
eBook
7
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”View full text
Electronic
eBook
9
Published 2013
Table of Contents:
“... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
14
Published 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
16
Table of Contents:
“...Introduction -- Preliminaries and Definitions -- Randomized Encoding of Functions -- Cryptography...”
View full text
View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... Behaviour -- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple...”View full text
Electronic
eBook



