Computer

Results: 301026



#Item
51Cryptography / Public-key cryptography / Identity-based cryptography / ID-based encryption / Advantage / Paillier cryptosystem / BonehFranklin scheme

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:55
52Cryptography / Cryptographic hash functions / HMAC / MD5 / Crypt / Collision attack / Padding / SHA-2 / MerkleDamgrd construction / SHA-1 / Hash function / Length extension attack

EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
53Statistical models / Probability and statistics / Statistical theory / Statistics / Timed automaton / Parametric model / Parameter / Markov decision process / Markov chain

Parameter Synthesis for Probabilistic Timed Automata Using Stochastic Game Abstractions Aleksandra Jovanovi´c, Marta Kwiatkowska Department of Computer Science, University of Oxford, Oxford, UK Abstract

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-05-12 04:35:43
54Cryptography / Computing / Security engineering / Crime prevention / Information governance / National security / Secure communication / Differential Privacy / Post-quantum cryptography / Privacy / Information security / Internet privacy

Luca Melis Curriculum Vitae Computer Science Dept, University College London Gower Street, London WC1E 6BT

Add to Reading List

Source URL: lucamelis.github.io

Language: English - Date: 2018-03-26 13:20:58
55Computing / System software / Information and communications technology / User interface techniques / Network protocols / Digital media / Mobile content / Universal Plug and Play / User interface / Ubiquitous computing / Personal computer / User

ARTICLE IN PRESS Int. J. Human-Computer Studies–700 Supporting serendipitous integration in mobile computing environments

Add to Reading List

Source URL: trevor.smith.name

Language: English - Date: 2012-11-23 14:19:46
56Enterprise application integration / Computing / Oracle SOA Suite / Matja / Business Process Execution Language / Oracle Fusion Middleware / Rozman / Economy / Software architecture

Matjaz B. Juric Matjaz B. Juric holds a Ph.D. in computer and information science. He is Full Professor at the University of Ljubljana, Faculty of Computer and Information Science. He is the head of Laboratory for Integr

Add to Reading List

Source URL: suncontract.org

Language: English - Date: 2018-10-19 08:31:23
57Mathematics / Mathematical analysis / Theoretical computer science / Lambda calculus / Differential calculus / Combinatory logic / Fixed-point combinator / Recursion / Ordinary differential equation / Derivative / Function / Monad

An Ode to Arrows Hai Liu Paul Hudak Department of Computer Science

Add to Reading List

Source URL: thev.net

Language: English - Date: 2009-11-11 16:42:08
58Mathematics / Algebra / Combinatorial optimization / Mathematical logic / Mathematical optimization / Operations research / Algorithm / Sheaf / Branch and bound / Universal property / Equation solving / Boolean algebra

Science of Computer Programming, 14(2-3), 1990, ppAlgorithm Theories and Design Tactics Douglas R. Smith and Michael R. Lowry Kestrel Institute 3260 Hillview Avenue

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-02 21:04:29
59Mathematical logic / Theoretical computer science / Mathematics / Formal methods / Boolean algebra / Temporal logic / Edsger W. Dijkstra / Predicate transformer semantics / Model theory / Hoare logic / True quantified Boolean formula / Linear temporal logic

Automatic Generation of Local Repairs for Boolean Programs Roopsha Samanta, Jyotirmoy V. Deshmukh and E. Allen Emerson Department of Electrical and Computer Engineering and Department of Computer Sciences, The University

Add to Reading List

Source URL: www.cs.purdue.edu

Language: English - Date: 2016-07-15 23:00:36
60Cryptography / Cyberwarfare / Computer security / Key management / Public key infrastructure / Software bugs / Computer network security / E-commerce / Buffer overflow / HTTP cookie / Cross-site scripting / Certificate authority

EECS 388 Intro to Computer Security November 11, 2016 Homework 5: Exam Review

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
UPDATE