Recovery

Results: 66998



#Item
1Cryptography / Cryptographic hash functions / Hashing / GOST standards / Message authentication codes / HMAC / GOST / SHA-2 / Hash function / Streebog / SHA-1 / Checksum

Introduction State-recovery for HMAC-HAIFA Short message attacks

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
2Cryptography / Block cipher modes of operation / Message authentication codes / Galois/Counter Mode / Cipher / Cryptographic hash functions / Block cipher / Stream cipher

Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
3Computing / System software / Network architecture / Computer architecture / Emerging technologies / OpenFlow / Software-defined networking / Transaction processing / Nox / Network function virtualization / LXC / Network switch

Control-plane Isolation and Recovery for a Secure SDN Architecture Takayuki Sasaki Daniele E. Asoni

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
4

Privacy-Preserving Compressive Sensing for Crowdsensing based Trajectory Recovery Linghe Kong∗‡ , Liang He† , Xiao-Yang Liu‡ , Yu Gu§ , Min-You Wu‡ , Xue Liu∗ ∗ McGill University, Canada, Email: linghe.ko

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-24 21:05:32
    5Computing / Network architecture / Emerging technologies / Configuration management / Software-defined networking / OpenFlow / Information and communications technology / Computer engineering / Scalability / Software-defined

    Robust fault-recovery in Software-Defined Networks IBSDN: IGP as a Backup in SDN JuneOlivier Tilmans

    Add to Reading List

    Source URL: inl.info.ucl.ac.be

    Language: English - Date: 2018-05-31 05:55:56
    6Computing / Concurrency control / Networking hardware / Information and communications technology / Concurrent computing / Computer networking / Computer network security / Middlebox / Monitor / Packet processing / Data Plane Development Kit / Transmission Control Protocol

    Rollback-Recovery for Middleboxes Justine Sherry∗ Peter Xiang Gao∗ Soumya Basu∗ Aurojit Panda∗ Arvind Krishnamurthy• Christian Maciocco† Maziar Manesh† João Martins/ Sylvia Ratnasamy∗ Luigi Rizzo‡ Scot

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2015-07-16 16:30:14
    7Network architecture / Computing / Computer architecture / Information and communications technology / Emerging technologies / Internet architecture / Configuration management / Software-defined networking / Network protocols / OpenFlow / Open vSwitch / Computer network

    Robust fault-recovery in Software-Defined Networks IBSDN: IGP as a Backup in SDN Master’s thesis presented in partial fulfillment of the requirements for the degree of

    Add to Reading List

    Source URL: inl.info.ucl.ac.be

    Language: English - Date: 2018-05-31 05:55:27
    8Financial markets / Issuer

    Emerging markets equities – focus on small/mid cap and frontier markets Outlook for Emerging Markets, navigating between cyclical recovery and the ramifications of the new economic policy in the USA. What are the risks

    Add to Reading List

    Source URL: www.fundexpertsforum.com

    Language: English - Date: 2018-05-29 09:58:37
    9Petroleum production / Chemistry / Petroleum / Nature / Petroleum geology / Enhanced oil recovery / Extraction of petroleum / Asphalt / Natural gas / Heavy oil production / Oil sands

    The Next Bigly Thing : Electro-Oil Atlas Burped : Electrical Stimulation of Oil Recovery by Robert A. Nelson It has become unarguably obvious to all but the most recidivist reader (present company excepted, of course), t

    Add to Reading List

    Source URL: www.rexresearch.com

    Language: English - Date: 2017-12-30 23:58:48
    10Transaction processing / Computing / Fault-tolerant computer systems / Data management / Application checkpointing / Data / Rollback / Database transaction / Checkpoint / Communication protocol / Two-phase commit protocol

    A Survey of Rollback-Recovery Protocols in Message-Passing Systems E.N. (MOOTAZ) ELNOZAHY IBM Research LORENZO ALVISI The University of Texas at Austin

    Add to Reading List

    Source URL: www.cs.utexas.edu

    Language: English - Date: 2002-05-07 12:54:50
    UPDATE