Marten

Results: 344



#Item
31

VUA-background : When to Use Background Information to Perform Word Sense Disambiguation Marten Postma Ruben Izquierdo Piek Vossen VU University Amsterdam

Add to Reading List

Source URL: alt.qcri.org

Language: English - Date: 2015-05-06 14:57:33
    32

    Exploring Implicit Memory for Painless Password Recovery Tamara Denning,†∗ Kevin Bowers,† Marten van Dijk,† and Ari Juels† RSA Labs,† University of Washington∗ , {kevin.bowers, mar

    Add to Reading List

    Source URL: www.arijuels.com

    Language: English - Date: 2013-09-22 13:28:28
      33

      Hourglass Schemes: How to Prove that Cloud Files Are Encrypted Marten van Dijk Ari Juels

      Add to Reading List

      Source URL: www.arijuels.com

      Language: English - Date: 2013-09-22 12:58:00
        34

          Pressemitteilung Helen Marten Parrot Problems –

        Add to Reading List

        Source URL: www.fridericianum.org

        Language: German - Date: 2014-08-22 06:08:19
          35

          How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes Kevin D. Bowers Marten van Dijk

          Add to Reading List

          Source URL: www.arijuels.com

          Language: English - Date: 2013-09-22 13:25:01
            36

            HELEN MARTEN PARROT PROBLEMS FARHAD FOZOUNI AFTERSHOCK POETRY JAMES BENNING, LUTZ DAMMBECK

            Add to Reading List

            Source URL: www.fridericianum.org

            Language: German - Date: 2014-10-01 12:23:31
              37

              On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk RSA Laboratories

              Add to Reading List

              Source URL: www.arijuels.com

              Language: English - Date: 2013-09-25 12:01:42
                38

                heather marten s p e c i a l e v e n t stationery

                Add to Reading List

                Source URL: www.theweddinginvitation.co.uk

                Language: English - Date: 2014-08-29 10:35:46
                  39

                  F L I P I T : The Game of “Stealthy Takeover” Marten van Dijk∗ Ari Juels† Alina Oprea‡

                  Add to Reading List

                  Source URL: www.arijuels.com

                  Language: English - Date: 2013-09-22 12:54:59
                    40

                    Defending Against the Unknown Enemy: Applying F L I P I T to System Security Kevin D. Bowers1 , Marten van Dijk1 , Robert Griffin2 , Ari Juels1 , Alina Oprea1 , Ronald L. Rivest3 , and Nikos Triandopoulos1 1

                    Add to Reading List

                    Source URL: www.arijuels.com

                    Language: English - Date: 2013-09-22 13:12:28
                      UPDATE