Sugestões de Tópicos dentro de sua pesquisa.
Sugestões de Tópicos dentro de sua pesquisa.
Pesquisas alternativas:
security functionals » security functional, security functions, security functionality
functionals function » function function, functions functional, function dysfunction
parallel function » parallel functional, parallel auction, parallel union
function security » functions security, nutrition security, aviation security
function https » functions https, fiction https
security functionals » security functional, security functions, security functionality
functionals function » function function, functions functional, function dysfunction
parallel function » parallel functional, parallel auction, parallel union
function security » functions security, nutrition security, aviation security
function https » functions https, fiction https
1
Sumário:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
Obter o texto integral
Obter o texto integral
Recurso Electrónico
livro electrónico
2
Publicado em 2013
Sumário:
“... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...”Obter o texto integral
Recurso Electrónico
livro electrónico
3
Publicado em 2005
Sumário:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”Obter o texto integral
Recurso Electrónico
livro electrónico
4
Sumário:
“...Introduction -- Preliminaries and Definitions -- Randomized Encoding of Functions -- Cryptography...”
Obter o texto integral
Obter o texto integral
Recurso Electrónico
livro electrónico
5
Publicado em 2010
Sumário:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”Obter o texto integral
Recurso Electrónico
livro electrónico
6
Publicado em 2010
Sumário:
“...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...”Obter o texto integral
Recurso Electrónico
livro electrónico
7
Publicado em 2007
Sumário:
“...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...”Obter o texto integral
Recurso Electrónico
livro electrónico
8
Publicado em 2010
Sumário:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”Obter o texto integral
Recurso Electrónico
livro electrónico
9
Publicado em 2012
Sumário:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”Obter o texto integral
Recurso Electrónico
livro electrónico
10
Publicado em 2015
Sumário:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”Obter o texto integral
Recurso Electrónico
livro electrónico
11
Publicado em 2005
Sumário:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”Obter o texto integral
Recurso Electrónico
livro electrónico
12
Publicado em 2006
Sumário:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”Obter o texto integral
Recurso Electrónico
livro electrónico
13
Publicado em 2006
Sumário:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”Obter o texto integral
Recurso Electrónico
livro electrónico
14
Publicado em 2015
Sumário:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”Obter o texto integral
Recurso Electrónico
livro electrónico
15
Publicado em 2013
Sumário:
“...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...”Obter o texto integral
Recurso Electrónico
livro electrónico
16
Publicado em 2010
Sumário:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”Obter o texto integral
Recurso Electrónico
livro electrónico
17
Publicado em 2012
Sumário:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”Obter o texto integral
Recurso Electrónico
livro electrónico
18
Publicado em 2013
Sumário:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”Obter o texto integral
Recurso Electrónico
livro electrónico
19
Publicado em 2008
Sumário:
“... Behaviour -- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple...”Obter o texto integral
Recurso Electrónico
livro electrónico
20
Publicado em 2006
Sumário:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”Obter o texto integral
Recurso Electrónico
livro electrónico



