Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
security functionality » security functional, obesity functionality, security functions
functionality function » functionals function, functionaries function, functional functions
parallel problem » parallel program, parallel programs, parallel robots
problem security » problems security, provable security, problems securing
function https » functions https, fiction https
security functionality » security functional, obesity functionality, security functions
functionality function » functionals function, functionaries function, functional functions
parallel problem » parallel program, parallel programs, parallel robots
problem security » problems security, provable security, problems securing
function https » functions https, fiction https
1
Pubblicazione 2010
Sommario:
“... for the LeadingOnes Problem -- Mirrored Sampling and Sequential Selection for Evolution Strategies -- Optimisation...”Testo
Elettronico
eBook
2
Pubblicazione 2005
Sommario:
“... Optical Networks -- A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems...”Testo
Elettronico
eBook
3
Pubblicazione 2010
Sommario:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”Testo
Elettronico
eBook
4
Pubblicazione 2010
Sommario:
“... for the Parallel Solution of Symmetric Tridiagonal Eigenvalue Problems -- A Parallel Solution of Large-Scale Heat...”Testo
Elettronico
eBook
5
Pubblicazione 2015
Sommario:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”Testo
Elettronico
eBook
6
Pubblicazione 2010
Sommario:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”Testo
Elettronico
eBook
7
Pubblicazione 2005
Sommario:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”Testo
Elettronico
eBook
8
Pubblicazione 2006
Sommario:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”Testo
Elettronico
eBook
9
Pubblicazione 2007
Sommario:
“...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...”Testo
Elettronico
eBook
10
Pubblicazione 2012
Sommario:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”Testo
Elettronico
eBook
11
Pubblicazione 2013
Sommario:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”Testo
Elettronico
eBook
12
Pubblicazione 2013
Sommario:
“...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...”Testo
Elettronico
eBook
13
Pubblicazione 2014
Sommario:
“... Generators -- Open Problems on Binary Bent Functions -- On Semi-bent functions and Related Plateaued...”Testo
Elettronico
eBook
14
Pubblicazione 2006
Sommario:
“... Approximation of S-box Functions -- Random Generation of S-Boxes for Block Ciphers -- Problems of Sending...”Testo
Elettronico
eBook
15
Pubblicazione 2015
Sommario:
“... in a Decision Making Problem by Preference Relation -- RBHR: Region-Based Hybrid Routing Protocol...”Testo
Elettronico
eBook
16
Pubblicazione 2005
Sommario:
“... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...”Testo
Elettronico
eBook
17
di Jones, Allen., Jones, Allen., MacDonald, Matthew., Rajan, Rakesh., Freeman, Adam.
Pubblicazione 2010
Sommario:
“... -- Graphics, Multimedia, and Printing -- Database Access -- Networking -- Security and Cryptography...”Pubblicazione 2010
Testo
Elettronico
eBook
18
Pubblicazione 2010
Sommario:
“... Function -- Symmetric Cryptography -- The Sum of CBC MACs Is a Secure PRF -- On Fast Verification of Hash...”Testo
Elettronico
eBook
19
Pubblicazione 2014
Sommario:
“... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...”Testo
Elettronico
eBook
20
Pubblicazione 2010
Sommario:
“... -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics...”Testo
Elettronico
eBook



