Showing 121 - 140 results of 206 for search '"Crypto "', query time: 0.11s Refine Results
  1. 121
    Table of Contents: “… Risk Management and Credit Derivatives -- Financial econometrics of Crypto-currencies -- A Technical…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 122
    Published 2013
    Table of Contents: “… -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification -- A Fully Homomorphic Crypto…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 123
    Published 2006
    Table of Contents: “… of Symmetric Key Systems -- Case Study of a Fault Attack on Asynchronous DES Crypto-Processors -- A Fault…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 124
  5. 125
    Published 2003
    Table of Contents: “… Enforcing Communication and Storage Complexity -- CryptoComputing with Rationals -- Privacy Tradeoffs: Myth…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 126
    Published 2014
    Table of Contents: “… III Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 127
    Published 2014
    Table of Contents: “… Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 128
  9. 129
    Published 2018
    Table of Contents: “… of pedagogic activities by distance learning Crypto and Services -- Spatial Cryptographic and Watermarking…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 130
    by Gebotys, Catherine H.
    Published 2010
    Full Text via HEAL-Link
    Electronic eBook
  11. 131
  12. 132
    Published 2012
    Table of Contents: “… of a New Class of 3-D Integrated Crypto Co-processors.  Smart Cards and Information Security…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 133
    Published 2016
    Table of Contents: “… Degree Video in Both 2D and 3D -- CrySIL: Bringing Crypto to the Modern User -- Motivating Online Teams…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 134
    Published 2017
    Table of Contents: “… and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 135
    Published 2018
    Table of Contents: “… Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware -- 7 BoTShark - A…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 136
  17. 137
  18. 138
    Published 2005
    Table of Contents: “… S-Box -- CryptoGraphics: Secret Key Cryptography Using Graphics Cards -- Side-Channel Leakage of Masked…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 139
  20. 140
    Published 2001
    Table of Contents: “… -- Asymmetric Currency Rounding -- Financial Crypto Policies and Issues -- The Encryption Debate in Plaintext…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search