Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc NetworksA.A. Adas, A.A. AdasJournal of King Abdulaziz University. Engineering sciences, 2017-01, Vol.28 (1), p.31-46 [Periódico revisado por pares]Sem texto completo |
|
2 |
Material Type: Artigo
|
HexE -- Securing Audio Contents in Voice Chat using Puzzle and TimestampAadhitya, AarXiv.org, 2024-01Ithaca: Cornell University Library, arXiv.orgTexto completo disponível |
|
3 |
Material Type: Artigo
|
Hardware Design and Analysis of the ACE and WAGE CiphersAagaard, Mark D ; Sattarov, Marat ; Zidaric, NusaarXiv.org, 2020-01Ithaca: Cornell University Library, arXiv.orgTexto completo disponível |
|
4 |
Material Type: Livro
|
Networked Services and Applications - Engineering, Control and Management: 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. ProceedingsAagesen, Finn Arve ; Knapskog, Svein J Knapskog, Svein Johan ; Aagesen, Finn ArveBerlin, Heidelberg: Springer Berlin Heidelberg 2010Sem texto completo |
|
5 |
Material Type: Artigo
|
mMIG: Inversion optimization in majority inverter graph with minority operationsAalam, Umar ; Mazumdar, Bodhisatwa ; Hubballi, NeminathIntegration (Amsterdam), 2021-11, Vol.81, p.195-210 [Periódico revisado por pares]Amsterdam: Elsevier B.VTexto completo disponível |
|
6 |
Material Type: Artigo
|
Optimal Design of Remote Terminal Unit (RTU) for Wireless SCADA System for Energy Management: Special Issue on the 2012 International Conference on Mobility for Life: Technology, Telecommunication and Problem Based Learning (TTPBL) ConferenceAAMIR, Muhammad ; PONCELA, Javier ; MUHAMMAD ASLAM UQAILI ; CHOWDHRY, B. S ; NISHAT AHMAD KHANWireless personal communications, 2013, Vol.69 (3), p.999-1012 [Periódico revisado por pares]Heidelberg: SpringerTexto completo disponível |
|
7 |
Material Type: Artigo
|
An efficient soft computing approach for securing information over GAMEOVER Zeus Botnets with modified CPA algorithmAanjankumar, S. ; Poonkuntran, S.Soft computing (Berlin, Germany), 2020-11, Vol.24 (21), p.16499-16507 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
8 |
Material Type: Artigo
|
Quantum lower bounds for the collision and the element distinctness problemsAaronson, Scott ; Shi, YaoyunJournal of the ACM, 2004-07, Vol.51 (4), p.595-605 [Periódico revisado por pares]New York: Association for Computing MachineryTexto completo disponível |
|
9 |
Material Type: Capítulo de Livro
|
Secure Public Cloud Storage Using Collobrative Access Control and Privacy Aware Data DeduplicationAarthi, A. ; Karthik, G. M. ; Sayeekumar, M. Balas, Valentina Emilia ; Hemanth, D. Jude ; Vadivu, G. ; Sangeetha, M.Artificial Intelligence Techniques for Advanced Computing Applications, 2021, Vol.130, p.213-224Singapore: Springer Singapore Pte. LimitedSem texto completo |
|
10 |
Material Type: Ata de Congresso
|
Enabling efficient and protected sharing of data in cloud computingAarthi, D. ; Indira, N.2016 International Conference on Information Communication and Embedded Systems (ICICES), 2016, p.1-5IEEESem texto completo |