Search Result "cryptography"


Spreadsheet Conditional Formatting Illuminates Investigations into Modular Arithmetic

Ebook: Young People’s Visions of the World

Volume: 1 Year: 2010
Author(s): David Miller,Stephen Sugden
Doi: 10.2174/97816080527691110101

High Performance Linux Clusters For Breaking RSA

Ebook: Young People’s Visions of the World

Volume: 1 Year: 2010
Author(s): Athar Mahboob,Nassar Ikram,Junaid Zubairi
Doi: 10.2174/97816080507721090101

Patents in Power Analysis Attacks and their Countermeasures for Cryptographic Devices

Journal: Recent Patents on Electrical Engineering
Volume: 3 Issue: 3 Year: 2010 Page: 177-185
Author(s): Radu Muresan

An Efficient Software Anti-Piracy Scheme

Journal: Recent Patents on Computer Science
Volume: 3 Issue: 1 Year: 2010 Page: 67-76
Author(s): Sattar J. Aboud

Classical Computer

Ebook: Young People’s Visions of the World

Volume: 1 Year: 2010
Author(s): Sergey P. Suprun,Anatoly P. Suprun
Doi: 10.2174/97816080534901120101

Secure Authentication in Group Communications Using Media Access Control (MAC) Address

Journal: Recent Patents on Computer Science
Volume: 3 Issue: 1 Year: 2010 Page: 14-19
Author(s): Sunghyuck Hong, Jeff Baker, Jaeki Song

Recent Advances on Documents Authentication Based on the Data Hiding and Watermarking Techniques

Journal: Recent Patents on Computer Science
Volume: 3 Issue: 3 Year: 2010 Page: 233-243
Author(s): Huijuan Yang, Xudong Jiang, Alex C. Kot

Results 1 - 1 of 7

Filter Result

Volume Year
Content Type
Ads
© 2024 Bentham Science Publishers | Privacy Policy