Information Technology University

Results: 8368



#Item
401Cryptography / Applied mathematics / Data Encryption Standard / Cryptanalysis / Block cipher / Linear cryptanalysis / Differential cryptanalysis / S-box

Automatic tool for differential cryptanalysis of SPNs Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
402

2005 PC Conference August5-7,2005 at Niigata University 電子情報支援技術に関する地域密着型教育プロジェクト Community-Based Education Project on Electronic and Information Technology-Based Assisti

Add to Reading List

Source URL: maeda.eng.niigata-u.ac.jp

Language: Japanese - Date: 2010-01-06 00:11:20
    403Brain / Emotion / Music information retrieval / Music software / Limbic system / Subjective experience / Information retrieval / Query

    Enriching Music Information Retrieval Using Emotion Detection Lijuan Zhou, Hongfei Lin, Wenfei Liu School of Computer Science and Technology Dalian University of Technology No. 2 Linggong Road, Dalian, China

    Add to Reading List

    Source URL: select.cs.cmu.edu

    Language: English - Date: 2011-06-25 12:47:15
    404Cryptography / Attribute-based encryption / Cipher / Encryption

    Attribute Based Encryption for Android Advisor(s): Christian Hanser Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    405

    Laptop/iPad Terms of Use Borrower’s Obligations  Students must follow all Kennesaw State University Information Technology Computer Usage Policies as well as Computer and Network Usage Policies (https://policy.kenne

    Add to Reading List

    Source URL: library.kennesaw.edu

    - Date: 2016-02-19 10:58:26
      406Computing / Network management / Information technology management / System software / NetFlow / SFlow / Traffic flow / Routing / Network traffic measurement / FlowMon

      Automating Network Monitoring on Experimental Testbeds Michael Golightly Princeton University Abstract

      Add to Reading List

      Source URL: static.usenix.org

      Language: English - Date: 2011-07-08 13:42:24
      407Double degree / Rensselaer Polytechnic Institute / Education in the United States / Education / Science and technology in the United States / Cal Poly Pomona academics / Northeastern University College of Computer and Information Science

      Accepted Salaries Rensselaer Polytechnic Institute Class of 2015 Overall Average Bachelor’s Degree Salary—$67,035

      Add to Reading List

      Source URL: rpi.edu

      Language: English - Date: 2016-05-18 11:11:26
      408File sharing networks / File sharing / Computing / Intellectual property law / Copyright law / Cryptography law / Digital rights management / Law / Technology / Peer-to-peer / Superdistribution / Social peer-to-peer processes

      A License Management Model to Support B2C and C2C Music Sharing S. H. Kwok and S. M. Lui Department of Information and Systems Management, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Ko

      Add to Reading List

      Source URL: www10.org

      Language: English - Date: 2001-04-19 03:15:30
      409New York / New Mexico Lobos / Lobo / Cyberinfrastructure / Chief information officer / New York Institute of Technology / New Mexico / Education in the United States / University of New Mexico

      Information Technologies Gil Gonzales, CIO FY 2011 Information Technologies Annual Report

      Add to Reading List

      Source URL: cio.unm.edu

      Language: English - Date: 2013-09-25 13:29:02
      410Software / Programming language implementation / Software testing / Program analysis / Quality assurance / Software review / Static program analysis / Static / Clang / Institute for Applied Information Processing and Communications

      Hardening Software against Physical Attacks using Static Analysis Advisor(s): Mario Werner Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      Language: English - Date: 2015-09-08 06:00:03
      UPDATE