CS-Cipher

Results: 180



#Item
31]~psilon-Nets and Simplex Range Queries David H a u s s l e r and E m o Welzl* D e p a r t m e n t of M a t h e m a t i c s and C o m p u t e r S c i e n c e , U n i v e r s i t y of Denver, Denver, Colorado 80208, USA.

]~psilon-Nets and Simplex Range Queries David H a u s s l e r and E m o Welzl* D e p a r t m e n t of M a t h e m a t i c s and C o m p u t e r S c i e n c e , U n i v e r s i t y of Denver, Denver, Colorado 80208, USA.

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2007-03-20 12:31:59
32U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
33CS 161  Computer Security Spring 2010

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
34On the Effectiveness of Movement Prediction To Reduce Energy Consumption in Wireless Communication Srijan Chakraborty and David K. Y. Yau Department of Computer Sciences Purdue University 

On the Effectiveness of Movement Prediction To Reduce Energy Consumption in Wireless Communication Srijan Chakraborty and David K. Y. Yau Department of Computer Sciences Purdue University 

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-11 06:24:21
35Compression, Correction, Confidentiality, and Comprehension: A Look at Telegraph Codes Steven M. Bellovin Columbia University  Abstract

Compression, Correction, Confidentiality, and Comprehension: A Look at Telegraph Codes Steven M. Bellovin Columbia University Abstract

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2011-07-09 23:38:25
36Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-04-02 08:24:08
371  A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation Siu F. Yeung, John C. S. Lui, Senior Member, IEEE, David K. Y. Yau, Member, IEEE

1 A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation Siu F. Yeung, John C. S. Lui, Senior Member, IEEE, David K. Y. Yau, Member, IEEE

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 10:49:44
38

PDF Document

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2011-02-24 07:34:27
39213  ARTIFICIAL INTELLIGENCE Intention Is Choice with Commitment* Philip R. Cohen

213 ARTIFICIAL INTELLIGENCE Intention Is Choice with Commitment* Philip R. Cohen

Add to Reading List

Source URL: www.cs.uu.nl

Language: English - Date: 2005-09-17 11:12:50
40

PDF Document

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-04-28 02:13:42