Your search for 42145 returns 21 document(s) |
Optimized X2-attack against RC6, Hal. 16-32 |
Author: Norihisa Isogai; Takashi Matsunaka and Atsuko Miyaji; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimized X2-attack against RC6, (LNCS-Lecture Notes in Computer Science 2576) Hal 16-32 |
Author: Norihisa Isogai; Takashi Matsunaka; Atsuko Miyaji; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A case against kruppa's equations for camera self calibration, page 1199 |
Author: P. Stum | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifiable E-Voting with Resistance against Physical Forced Abstention Attack (85-90) |
Author: Misni Harjo Suwirto
Sabyasachi Dutta; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A quantitative approach to the design of an optimized hardware interpreter for java byte-code |
Author: C. Masera G. Pinccinini, M. Ruo Roch, M. Zamboni; | Call Number: SEM-275 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimized sampling with clustering approach for large instrusion detection data. hal, 56 |
Author: Nani yasmin, Anto Satriyo Nugroho, Harya Widiputra; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Penerapan end-to-end delay optimized multipath routing pada jaringan berbasis openflow |
Author: I Gede Oka Gartria Atitama; | Call Number: T-1070 (SOFTCOPY T-779) SOURCE CODE T-208 | Edition: 2014 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Optimized Lumped Element Improved Performance Hybrid Directional Couplers (489-494) |
Author: Mazhar B. Tayel
Hani S. Alhakami; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A System for person-independent hand posture recognition against complex backgrounds, page 1449 |
Author: J. Triesch | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330 |
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|