Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
code functionality » cova functionality, more functionality, scale functionality
parallel problem » parallel program, parallel programs, parallel robots
problem code » problems code, problem model, problem modes
https » http
functionality security » functionality securing, functional security, functionality usability
code functionality » cova functionality, more functionality, scale functionality
parallel problem » parallel program, parallel programs, parallel robots
problem code » problems code, problem model, problem modes
https » http
1
Published 2010
Table of Contents:
“... for the LeadingOnes Problem -- Mirrored Sampling and Sequential Selection for Evolution Strategies -- Optimisation...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Optical Networks -- A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... for the Parallel Solution of Symmetric Tridiagonal Eigenvalue Problems -- A Parallel Solution of Large-Scale Heat...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“... for the Extendability of Ternary Linear Codes -- On the Design of Codes for DNA Computing -- Open Problems Related...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...”View full text
Electronic
eBook
14
Published 2014
Table of Contents:
“... Generators -- Open Problems on Binary Bent Functions -- On Semi-bent functions and Related Plateaued...”View full text
Electronic
eBook
15
Published 2006
Table of Contents:
“... Approximation of S-box Functions -- Random Generation of S-Boxes for Block Ciphers -- Problems of Sending...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“... in a Decision Making Problem by Preference Relation -- RBHR: Region-Based Hybrid Routing Protocol...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...”View full text
Electronic
eBook
18
Table of Contents:
“... -- Unmanaged Code Interoperability -- Commonly Used Interfaces and Patterns -- Windows Integration -- Parallel...”
View full text
View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... Function -- Symmetric Cryptography -- The Sum of CBC MACs Is a Secure PRF -- On Fast Verification of Hash...”View full text
Electronic
eBook
20
Published 2012
Subjects:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”View full text
Electronic
eBook



