1
Published 2006
Table of Contents: ...Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...
View full text
Electronic eBook
3
Published 2012
Table of Contents: ... Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security -- Efficient Secure Primitive...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... Computing for High-Security/High-Performance Ambient Systems -- FPL-3E: Towards Language Support...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ... Rate Coefficients -- Overview Of The Eurochamp Database Of European Atmosphere Simulation Chambers...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... -- Simulation of Liberation and Dispersion of Radon from a Waste Disposal -- Methods of Efficient Modeling...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... Approximation of S-box Functions -- Random Generation of S-Boxes for Block Ciphers -- Problems of Sending...
View full text
Electronic eBook
8
Published 2013
Table of Contents: ... Fermentation at Slightly Alkaline and Acidic pHs: Novel Functions of Hydrogenase 4 (hyf) and Hydrogenase 2 (hyb...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... in a Decision Making Problem by Preference Relation -- RBHR: Region-Based Hybrid Routing Protocol...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ...Solving the 0-1 Knapsack Problem Using Genetic Algorithm - Teaching Learning Based Optimization...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ... Zeros of Analytic Functions -- Reducing Overhead in Sparse Hypermatrix Cholesky Factorization...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... to the Determination of Functional Groups in the Neural System of C. Elegans -- Modelling Gene Regulatory Networks...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative...
View full text
Electronic eBook
14
Published 2013
Table of Contents: ....- Toward Smart Microgrid with Renewable Energy: An Overview of Network Design, Security, and Standards...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Algorithm for Deformation Simulation of Soft Tissues -- Multiple Sequence Alignment Based on ABC_SA -- TDMA...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... -- Construction of Hash Function -- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free...
View full text
Electronic eBook
17
Published 2014
Table of Contents: ... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...
View full text
Electronic eBook
18
Published 2015
Table of Contents: ...Public-Key Encryption -- Simulation-Based Selective Opening CCA Security for PKE from Key...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Unit -- A Study of the Protein Folding Problem by a Simulation Model -- Analysing Multiobjective...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... Preserving Combiners for Hash Functions -- OT-Combiners via Secure Computation -- Semi-honest to Malicious...
View full text
Electronic eBook