Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
system functionality » system functional, systems functional, protein functionality
parallel function » parallel functional, parallel auction, parallel union
function system » function systems, functional system, functional systems
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
system functionality » system functional, systems functional, protein functionality
parallel function » parallel functional, parallel auction, parallel union
function system » function systems, functional system, functional systems
securing https » security https, security http, securing rtp
1
Table of Contents:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
View full text
View full text
Electronic
eBook
2
Published 2013
Table of Contents:
“... are Parallel Connections better than Series Connections -- Optimization of Carrier Harvest in Meg Based Hybrid...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... -- Session 2: Peer-to-Peer Computing -- A Secure P2P Video Conference System for Enterprise Environments...”View full text
Electronic
eBook
4
Published 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“...-Parallel Systems -- A New Hybrid Parallel Algorithm for MrBayes -- Research and Design of Deployment...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Thread -- Parallel Programming on a Soft-Core Based Multi-core System -- Dynamic Resource Tuning...”View full text
Electronic
eBook
7
Published 2012
Table of Contents:
“... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“... File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation...”View full text
Electronic
eBook
12
Published 2005
Table of Contents:
“... -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security...”View full text
Electronic
eBook
13
Published 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”View full text
Electronic
eBook
14
Published 2015
Table of Contents:
“...An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... of length and mathematical operators on the usability and security of system-assigned one-time PINs...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“... Sources of Additive Noise -- A Security Supervision System for Hybrid Networks -- Cost Minimization...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... for Performance Evaluation of Parallel and Distributed Systems -- Integrating Distributed Composite Objects...”View full text
Electronic
eBook



