Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
functionality security » functionality securing, functional security, functionality usability
using functionality » missing functionality, adding functionality, using functionalized
parallel function » parallel functional, parallel auction, parallel union
https » http
functionality security » functionality securing, functional security, functionality usability
using functionality » missing functionality, adding functionality, using functionalized
parallel function » parallel functional, parallel auction, parallel union
https » http
1
Sommario:
“...Introduction -- Use Cases -- The Basic Applications -- Testing and Specification of PUFs -- Error...”
Testo
Testo
Elettronico
eBook
2
Pubblicazione 2005
Sommario:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”Testo
Elettronico
eBook
3
Pubblicazione 2010
Sommario:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”Testo
Elettronico
eBook
4
Pubblicazione 2010
Sommario:
“... Grove and Its Distributed Performance -- A Massively Parallel Hardware for Modular Exponentiations Using...”Testo
Elettronico
eBook
5
Pubblicazione 2010
Sommario:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”Testo
Elettronico
eBook
6
Pubblicazione 2005
Sommario:
“... -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security...”Testo
Elettronico
eBook
7
Pubblicazione 2006
Sommario:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”Testo
Elettronico
eBook
8
Pubblicazione 2015
Sommario:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”Testo
Elettronico
eBook
9
Pubblicazione 2007
Sommario:
“... Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory...”Testo
Elettronico
eBook
10
Pubblicazione 2012
Sommario:
“... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...”Testo
Elettronico
eBook
11
Pubblicazione 2006
Sommario:
“... for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique...”Testo
Elettronico
eBook
12
Pubblicazione 2010
Sommario:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”Testo
Elettronico
eBook
13
Pubblicazione 2012
Sommario:
“... and Value Faults -- An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use...”Testo
Elettronico
eBook
14
Pubblicazione 2015
Sommario:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”Testo
Elettronico
eBook
15
Pubblicazione 2013
Sommario:
“... of Authentication Using Brainwaves -- Usability and Security of Gaze-Based Graphical Grid Passwords -- The impact...”Testo
Elettronico
eBook
16
Pubblicazione 2013
Sommario:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”Testo
Elettronico
eBook
17
Pubblicazione 2008
Sommario:
“... the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm -- Spatio-temporal Facial...”Testo
Elettronico
eBook
18
Pubblicazione 2006
Sommario:
“... -- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM -- Wavelet Transform in Face...”Testo
Elettronico
eBook
19
Pubblicazione 2005
Sommario:
“... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...”Testo
Elettronico
eBook
20
Pubblicazione 2007
Sommario:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”Testo
Elettronico
eBook



