141![The Next 700 Programming Languages P. J. Landin Univac Division of Sperry Rand Corp., New York, New York The Next 700 Programming Languages P. J. Landin Univac Division of Sperry Rand Corp., New York, New York](https://www.pdfsearch.io/img/f23c468f878ad9657197c7d39596d366.jpg) | Add to Reading ListSource URL: www.cs.cmu.eduLanguage: English - Date: 2009-09-13 14:59:50
|
---|
142![Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET](https://www.pdfsearch.io/img/75073a40915b703a163fb648a7186113.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2012-02-06 15:11:29
|
---|
143![Some Techniques for Solving Recurrences GEORGE S. LUEKER Department of Information and Computer Scwnce, Unwers~ty of California, lrvine, California 92717 Some Techniques for Solving Recurrences GEORGE S. LUEKER Department of Information and Computer Scwnce, Unwers~ty of California, lrvine, California 92717](https://www.pdfsearch.io/img/f3636d8b25b6fbb3afd846149e7badc3.jpg) | Add to Reading ListSource URL: www.cs.virginia.eduLanguage: English - Date: 2009-09-02 15:33:25
|
---|
144![The Byzantine Generals Problem LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE SRI International The Byzantine Generals Problem LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE SRI International](https://www.pdfsearch.io/img/8f11c805d48607073938be9f4622272b.jpg) | Add to Reading ListSource URL: www.cs.cornell.eduLanguage: English - Date: 2002-12-06 15:16:33
|
---|
145![A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton](https://www.pdfsearch.io/img/255a21aabaacd0b1f1ba95287896d0b3.jpg) | Add to Reading ListSource URL: www.cs.berkeley.eduLanguage: English - Date: 2008-10-23 15:16:37
|
---|
146![Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and](https://www.pdfsearch.io/img/379a50eec2603c9a0d5a32db00f4a37b.jpg) | Add to Reading ListSource URL: www.cs.ucdavis.eduLanguage: English - Date: 2004-02-01 14:57:44
|
---|
147![Mining Time-Changing Data Streams Geoff Hulten Dept. of ComputerScience Mining Time-Changing Data Streams Geoff Hulten Dept. of ComputerScience](https://www.pdfsearch.io/img/82e95dcb620c80ef7345486cb28a51ca.jpg) | Add to Reading ListSource URL: www.cs.uiuc.eduLanguage: English - Date: 2002-09-12 11:34:56
|
---|
148![Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov](https://www.pdfsearch.io/img/c4182b9c0cd8f3239bc5104171134230.jpg) | Add to Reading ListSource URL: www.cs.colorado.eduLanguage: English - Date: 2001-10-23 20:39:38
|
---|
149![CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗ CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗](https://www.pdfsearch.io/img/30ed9aecc53989b8954920e748ea9edf.jpg) | Add to Reading ListSource URL: www.cs.ucdavis.eduLanguage: English - Date: 2003-12-03 13:40:14
|
---|
150![To appear in J. of Cryptology To appear in J. of Cryptology](https://www.pdfsearch.io/img/2c395227cc841161d298cd0788ca81ce.jpg) | Add to Reading ListSource URL: www.cs.ucdavis.eduLanguage: English - Date: 2008-09-21 22:35:16
|
---|