„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Using the audio of 8-bit video games to monitor web marketing campaigns
-
Efficient logo recognition by local feature groups
-
Hasse–Weil bound for additive cyclic codes
-
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
-
Electromagnetic fault injection: the curse of flip-flops
-
New lower bounds for the Shannon capacity of odd cycles
-
Direct constructions of large sets of Kirkman triple systems
-
Algebraic decoding of folded Gabidulin codes
-
Light tails and the Hermitian dual polar graphs
-
Cryptanalysis of Dual RSA
-
Discovering discriminative patches for free-hand sketch analysis
-
Exclusive exponent blinding is not enough to prevent any timing attack on RSA
-
Secure key generation from biased PUFs: extended version
-
Recognizing human gestures in videos by modeling the mutual context of body position and hands movement
-
Report
-
Juristen & Techniker
-
Safe-Harbor – Positionspapier der Datenschutzkonferenz der Datenschutzbeauftragten des Bundes und der Länder vom 26. Oktober 2015
-
Kann ein Gesetz für mehr IT-Sicherheit sorgen?
-
DuD Recht
-
Rezensionen