2-2-2

Results: 835450



#Item
171StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
1722009 Edition	  Page 27 PART 2 SIGNS

2009 Edition Page 27 PART 2 SIGNS

Add to Reading List

Source URL: mutcd.fhwa.dot.gov

Language: English - Date: 2012-05-11 12:14:54
173SPAZIO EVENTI c/o Centro Svizzero – Via Palestro 2, 20121 Milano. Tel. + - Fax +  All’interno del Centro Svizzero al 3° piano, in Piazza Cavour, SPAZIO EVENTI è una location dalla pos

SPAZIO EVENTI c/o Centro Svizzero – Via Palestro 2, 20121 Milano. Tel. + - Fax + All’interno del Centro Svizzero al 3° piano, in Piazza Cavour, SPAZIO EVENTI è una location dalla pos

Add to Reading List

Source URL: www.swisschamber.it

Language: Italian - Date: 2016-03-10 04:32:12
    174Projecting a Modular Future Markus Voelter1 , Jos Warmer2 , and Bernd Kolb3 1 2

    Projecting a Modular Future Markus Voelter1 , Jos Warmer2 , and Bernd Kolb3 1 2

    Add to Reading List

    Source URL: mbeddr.com

    Language: English - Date: 2018-08-02 04:06:51
    175CLEF: Limiting the Damage Caused by Large Flows in the Internet Core Hao Wu1,2[0000−0002−5100−1519] , Hsu-Chun Hsiao3[0000−0001−9592−6911] , Daniele E. Asoni4[0000−0001−5699−9237] , 4[0000−0001−9557

    CLEF: Limiting the Damage Caused by Large Flows in the Internet Core Hao Wu1,2[0000−0002−5100−1519] , Hsu-Chun Hsiao3[0000−0001−9592−6911] , Daniele E. Asoni4[0000−0001−5699−9237] , 4[0000−0001−9557

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    176Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2  Department of Computer Science, University of Oxford, UK

    Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2 Department of Computer Science, University of Oxford, UK

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2013-12-01 10:21:43
    177Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1  EPFL, Lausanne, Switzerland

    Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1 EPFL, Lausanne, Switzerland

    Add to Reading List

    Source URL: kannwischer.eu

    Language: English - Date: 2018-10-15 10:31:49
    178Kompaktflyer 06: Der Business Model Navigator 2/3

    Kompaktflyer 06: Der Business Model Navigator 2/3

    Add to Reading List

    Source URL: gemeinsam-digital.de

    Language: German - Date: 2017-08-07 05:23:19
      179Table of Contents 1. Legal basis .............................................................................................................................3  2.

      Table of Contents 1. Legal basis .............................................................................................................................3 2.

      Add to Reading List

      Source URL: asut.ch

      Language: English - Date: 2015-08-17 11:06:42
      180Solving Non-Linear Arithmetic Dejan Jovanovi´c1 and Leonardo de Moura2 1 2  New York University

      Solving Non-Linear Arithmetic Dejan Jovanovi´c1 and Leonardo de Moura2 1 2 New York University

      Add to Reading List

      Source URL: csl.sri.com

      Language: English - Date: 2014-06-27 12:47:14