CS-Cipher

Results: 180



#Item
61The Byzantine Generals Problem LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE SRI International Reliable computer systems must handle malfunctioningcomponents that give conflicting information to different parts of t

The Byzantine Generals Problem LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE SRI International Reliable computer systems must handle malfunctioningcomponents that give conflicting information to different parts of t

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2002-12-06 15:16:33
62A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-28 16:26:57
63HOMOMORPHIC PRIMITIVES FOR A PRIVACY-FRIENDLY SMART METERING ARCHITECTURE Benjamin Vetter1 , Osman Ugus1 , Dirk Westhoff1 and Christoph Sorge2 1 Department  of Computer Science, HAW Hamburg, Germany

HOMOMORPHIC PRIMITIVES FOR A PRIVACY-FRIENDLY SMART METERING ARCHITECTURE Benjamin Vetter1 , Osman Ugus1 , Dirk Westhoff1 and Christoph Sorge2 1 Department of Computer Science, HAW Hamburg, Germany

Add to Reading List

Source URL: www.cs.uni-paderborn.de

Language: English - Date: 2012-08-30 05:14:49
64Smart Diagnostics Dynamics of Design3.doc

Smart Diagnostics Dynamics of Design3.doc

Add to Reading List

Source URL: www.cs.uu.nl

Language: English - Date: 2006-07-06 07:59:13
65Securing Web Communications  A Thesis in TCC 402 Presented to The Faculty of the

Securing Web Communications A Thesis in TCC 402 Presented to The Faculty of the

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-24 12:59:59
66Practical Graph Isomorphism

Practical Graph Isomorphism

Add to Reading List

Source URL: cs.anu.edu.au

Language: English - Date: 2010-02-12 07:03:26
67all-souls-rc-primary-school-coventry-w400[removed]cs.jpg

all-souls-rc-primary-school-coventry-w400[removed]cs.jpg

Add to Reading List

Source URL: www.techniquest.org

Language: English - Date: 2014-10-09 05:06:53
68Tempo-toolkit: Tempo to Java Translation Module Chryssis Georgiou∗ , Peter M. Musial† , and Christos Ploutarchou∗ ∗ University of Cyprus, Nicosia, Cyprus Email: {chryssis, christos.ploutarchou}@cs.ucy.ac.cy

Tempo-toolkit: Tempo to Java Translation Module Chryssis Georgiou∗ , Peter M. Musial† , and Christos Ploutarchou∗ ∗ University of Cyprus, Nicosia, Cyprus Email: {chryssis, christos.ploutarchou}@cs.ucy.ac.cy

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2013-05-14 01:48:50
69Computers Freedom & Privacy Wednesday April 5th, 2000 C H

Computers Freedom & Privacy Wednesday April 5th, 2000 C H

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2000-04-19 13:05:30
70Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 14:52:13