CS-Cipher

Results: 180



#Item
41Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
42Crypto Corner Editors: Peter Gutmann,  David Naccache,  Charles C. Palmer,   Room at the Bottom

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
43Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:18
44Irregularity in Multi-Dimensional Space-Filling Curves with Applications in Multimedia Databases Mohamed F. Mokbel Walid G. Aref

Irregularity in Multi-Dimensional Space-Filling Curves with Applications in Multimedia Databases Mohamed F. Mokbel Walid G. Aref

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:39
45Outliers: The Story of Success (Little, Brown & Co; 2008)

Outliers: The Story of Success (Little, Brown & Co; 2008)

Add to Reading List

Source URL: cs.ecust.edu.cn

Language: English - Date: 2013-01-13 20:14:59
46

PDF Document

Add to Reading List

Source URL: iram.cs.berkeley.edu

Language: English - Date: 2000-01-18 18:21:10
47A new and faster method of sorting by transpositions Maxime Benoˆıt-Gagne´ et Sylvie Hamel ´ ´ Departement

A new and faster method of sorting by transpositions Maxime Benoˆıt-Gagne´ et Sylvie Hamel ´ ´ Departement

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2007-07-27 14:38:37
48USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-05-14 16:00:09
49Exact Bayesian Learning of Ancestor Relations in Bayesian Networks  Exact Bayesian Learning of Ancestor Relations in Bayesian Networks Supplementary Material Yetian Chen

Exact Bayesian Learning of Ancestor Relations in Bayesian Networks Exact Bayesian Learning of Ancestor Relations in Bayesian Networks Supplementary Material Yetian Chen

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2015-01-23 16:32:42
50Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07