Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: magazinearticle
|
![]() |
108-bit elliptic curve cryptographic key foundDr. Dobb's Journal, 2000-07, Vol.25 (7), p.18-18San Mateo: InformaTexto completo disponível |
2 |
Material Type: Artigo de Jornal
|
![]() |
2 China Schools Said to Be Tied to Online AttacksNew York Times (Online), 2010-02-18New York: New York Times CompanyTexto completo disponível |
3 |
Material Type: magazinearticle
|
![]() |
40 years of suffix treesApostolico, Alberto ; Crochemore, Maxime ; Farach-Colton, Martin ; Galil, Zvi ; Muthukrishnan, S.Communications of the ACM, 2016-04, Vol.59 (4), p.66-73New York: Association for Computing MachineryTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
A 1 Gbps Chaos-Based Stream Cipher Implemented in 0.18 μm CMOS TechnologyGarcia-Bosque, Miguel ; Díez-Señorans, Guillermo ; Pérez-Resa, Adrián ; Sánchez-Azqueta, Carlos ; Aldea, Concepción ; Celma, SantiagoElectronics (Basel), 2019-06, Vol.8 (6), p.623 [Periódico revisado por pares]Basel: MDPI AGTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing EnvironmentsLiu, Xin ; Liu, Xiaomeng ; Xiong, Neal ; Luo, Dan ; Xu, Gang ; Chen, XiuboElectronics (Basel), 2023-04, Vol.12 (9), p.1983 [Periódico revisado por pares]Basel: MDPI AGTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
ABEL PRIZE CELEBRATES UNION OF MATHS AND COMPUTER SCIENCENature (London), 2021-03, Vol.591 (7851), p.507-507 [Periódico revisado por pares]London: Nature Publishing GroupTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Abnormal Access Behavior Detection of Ideological and Political MOOCs in Colleges and UniversitiesHong, Ni ; Wang, Xuefeng ; Wang, Zhonghua Lv, Jianhui ; Jianhui LvMobile information systems, 2021-04, Vol.2021, p.1-9 [Periódico revisado por pares]Amsterdam: HindawiSem texto completo |
8 |
Material Type: Artigo
|
![]() |
About Fully Homomorphic Encryption Improvement Techniques: NISS2018 Conference PaperEl-Yahyaoui, Ahmed ; El Kettani, Mohamed Daifr Ech-CherifInternational journal of e-politics, 2019-07, Vol.10 (3), p.1-20 [Periódico revisado por pares]Hershey: IGI GlobalSem texto completo |
9 |
Material Type: magazinearticle
|
![]() |
Academic freedom and the hacker ethicCross, TomCommunications of the ACM, 2006-06, Vol.49 (6), p.37-40New York: Association for Computing MachineryTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Accelerating Health Data Sharing: A Solution Based on the Internet of Things and Distributed Ledger TechnologiesZheng, Xiaochen ; Sun, Shengjing ; Mukkamala, Raghava Rao ; Vatrapu, Ravi ; Ordieres-Meré, JoaquínJournal of medical Internet research, 2019-06, Vol.21 (6), p.e13583-e13583 [Periódico revisado por pares]Canada: Journal of Medical Internet ResearchTexto completo disponível |