Foreslåede emner i din søgning.
Foreslåede emner i din søgning.
Søg alternativer:
parallel functionality » parallel functional, oracle functionality, carbonyl functionality
functionality security » functionality securing, functional security, functionality usability
security function » security functions, security functional, security fiction
using https » using http, nursing https, aging https
parallel functionality » parallel functional, oracle functionality, carbonyl functionality
functionality security » functionality securing, functional security, functionality usability
security function » security functions, security functional, security fiction
using https » using http, nursing https, aging https
1
Indholdsfortegnelse:
“...Introduction -- Use Cases -- The Basic Applications -- Testing and Specification of PUFs -- Error...”
Få fuldtekst
Få fuldtekst
Electronisk
eBog
2
Udgivet 2005
Indholdsfortegnelse:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”Få fuldtekst
Electronisk
eBog
3
Udgivet 2010
Indholdsfortegnelse:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”Få fuldtekst
Electronisk
eBog
4
Udgivet 2010
Indholdsfortegnelse:
“... Grove and Its Distributed Performance -- A Massively Parallel Hardware for Modular Exponentiations Using...”Få fuldtekst
Electronisk
eBog
5
Udgivet 2010
Indholdsfortegnelse:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”Få fuldtekst
Electronisk
eBog
6
Udgivet 2005
Indholdsfortegnelse:
“... -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security...”Få fuldtekst
Electronisk
eBog
7
Udgivet 2006
Indholdsfortegnelse:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”Få fuldtekst
Electronisk
eBog
8
Udgivet 2015
Indholdsfortegnelse:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”Få fuldtekst
Electronisk
eBog
9
Udgivet 2007
Indholdsfortegnelse:
“... Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory...”Få fuldtekst
Electronisk
eBog
10
Udgivet 2012
Indholdsfortegnelse:
“... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...”Få fuldtekst
Electronisk
eBog
11
Udgivet 2006
Indholdsfortegnelse:
“... for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique...”Få fuldtekst
Electronisk
eBog
12
Udgivet 2010
Indholdsfortegnelse:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”Få fuldtekst
Electronisk
eBog
13
Udgivet 2012
Indholdsfortegnelse:
“... and Value Faults -- An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use...”Få fuldtekst
Electronisk
eBog
14
Udgivet 2015
Indholdsfortegnelse:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”Få fuldtekst
Electronisk
eBog
15
Udgivet 2013
Indholdsfortegnelse:
“... of Authentication Using Brainwaves -- Usability and Security of Gaze-Based Graphical Grid Passwords -- The impact...”Få fuldtekst
Electronisk
eBog
16
Udgivet 2013
Indholdsfortegnelse:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”Få fuldtekst
Electronisk
eBog
17
Udgivet 2008
Indholdsfortegnelse:
“... the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm -- Spatio-temporal Facial...”Få fuldtekst
Electronisk
eBog
18
Udgivet 2006
Indholdsfortegnelse:
“... -- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM -- Wavelet Transform in Face...”Få fuldtekst
Electronisk
eBog
19
Udgivet 2005
Indholdsfortegnelse:
“... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...”Få fuldtekst
Electronisk
eBog
20
Udgivet 2007
Indholdsfortegnelse:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”Få fuldtekst
Electronisk
eBog



