1
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
View full text
Electronic eBook
2
Published 2013
Table of Contents: ... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... -- Session 2: Peer-to-Peer Computing -- A Secure P2P Video Conference System for Enterprise Environments...
View full text
Electronic eBook
4
Published 2015
Table of Contents: ...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ...-Parallel Systems -- A New Hybrid Parallel Algorithm for MrBayes -- Research and Design of Deployment...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Thread -- Parallel Programming on a Soft-Core Based Multi-core System -- Dynamic Resource Tuning...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure...
View full text
Electronic eBook
11
Published 2006
Table of Contents: ... File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...
View full text
Electronic eBook
14
Published 2015
Table of Contents: ...An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy...
View full text
Electronic eBook
15
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
16
Published 2013
Table of Contents: ... of length and mathematical operators on the usability and security of system-assigned one-time PINs...
View full text
Electronic eBook
17
Published 2013
Table of Contents: ... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ... Sources of Additive Noise -- A Security Supervision System for Hybrid Networks -- Cost Minimization...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... for Performance Evaluation of Parallel and Distributed Systems -- Integrating Distributed Composite Objects...
View full text
Electronic eBook