and Science

Results: 374638



#Item
51Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division.  Nigel Smart, Professor of Cryptology,

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
52HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:27
53Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2  Department of Computer Science, University of Oxford, UK

Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2 Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2013-12-01 10:21:43
54The Alan Turing Institute SME Consultation Understanding the data science and artificial intelligence (AI) needs of UK SMEs The Alan Turing Institute has commenced work to better understand and engage with small and medi

The Alan Turing Institute SME Consultation Understanding the data science and artificial intelligence (AI) needs of UK SMEs The Alan Turing Institute has commenced work to better understand and engage with small and medi

Add to Reading List

Source URL: www.turing.ac.uk

Language: English - Date: 2018-10-18 12:34:48
55High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
56University of Washington Database Group Quarterly Newsletter - FallUW Database Group Data management systems, cloud services, probabilistic databases, and data pricing in Computer Science & Engineering at the Univ

University of Washington Database Group Quarterly Newsletter - FallUW Database Group Data management systems, cloud services, probabilistic databases, and data pricing in Computer Science & Engineering at the Univ

Add to Reading List

Source URL: db.cs.washington.edu

Language: English - Date: 2018-10-11 15:27:57
57Publication list  We list below the publications acknowledging Milyon. They are sorted by • Papers published in peer-reviewed journals extracted from Web of Science database and mentioning Milyon in the text. • Paper

Publication list We list below the publications acknowledging Milyon. They are sorted by • Papers published in peer-reviewed journals extracted from Web of Science database and mentioning Milyon in the text. • Paper

Add to Reading List

Source URL: milyon.universite-lyon.fr

Language: English - Date: 2018-10-18 05:08:08
    58Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

    Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2011-03-10 12:58:06
    59Four Round Secure Computation without Setup Zvika Brakerski1,? and Shai Halevi2,?? and Antigoni Polychroniadou3,? ? ? 1 Weizmann Institute of Science

    Four Round Secure Computation without Setup Zvika Brakerski1,? and Shai Halevi2,?? and Antigoni Polychroniadou3,? ? ? 1 Weizmann Institute of Science

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-03-10 16:45:59
    60Science Blockchain ICO and Incubator SUMMARY SEPTEMBER 2017

    Science Blockchain ICO and Incubator SUMMARY SEPTEMBER 2017

    Add to Reading List

    Source URL: s3-us-west-2.amazonaws.com

    Language: English - Date: 2017-08-31 14:21:02