Initialization

Results: 404



#Item
111Hector: Detecting Resource-Release Omission Faults in Error-Handling Code for Systems Software Suman Saha Jean-Pierre Lozi

Hector: Detecting Resource-Release Omission Faults in Error-Handling Code for Systems Software Suman Saha Jean-Pierre Lozi

Add to Reading List

Source URL: pagesperso-systeme.lip6.fr

Language: English - Date: 2013-12-21 16:12:48
1122nd Workshop on Parameterization of Lakes in Numerical Weather Prediction and Climate Modelling Lake parameters climatology for cold start runs (lake initialization) in the ECMWF forecast system

2nd Workshop on Parameterization of Lakes in Numerical Weather Prediction and Climate Modelling Lake parameters climatology for cold start runs (lake initialization) in the ECMWF forecast system

Add to Reading List

Source URL: netfam.fmi.fi

Language: English - Date: 2010-09-17 09:03:08
113A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
114Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
115ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1?  Orr Dunkelman2

ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1? Orr Dunkelman2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-07-29 09:57:15
116Chapter 1 Introduction Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication c

Chapter 1 Introduction Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:40:23
117A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
118∗  How to Break XML Encryption Tibor Jager  Juraj Somorovsky

∗ How to Break XML Encryption Tibor Jager Juraj Somorovsky

Add to Reading List

Source URL: nds.rub.de

Language: English - Date: 2011-10-22 15:23:47
119Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo  May 13, 2011

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
120Justifying Security Spending

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:38