Search Constraints
« Previous |
31 - 40 of 50
|
Next »
Search Results
Select an image to start the slideshow
Data Sharing on Untrusted Storage with Attribute-Based Encryption
1 of 10
Modeling the Behavior of Multipath Components Pertinent to Indoor Geolocation
2 of 10
Design and Implementation of
3 of 10
An Efficient Scheme to Provide Real-time Memory Integrity Protection
4 of 10
SmartCell: An Energy Efficient Reconfigurable Architecture for Stream Processing
5 of 10
Efficient and Tamper-Resilient Architectures for Pairing Based Cryptography
6 of 10
Identification and Modeling of the Dynamic Behavior of the Direct Path Component in ToA-Based Indoor Localization Systems
7 of 10
Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography
8 of 10
Tamper-Resistant Arithmetic for Public-Key Cryptography
9 of 10
Communication Security in Wireless Sensor Networks
10 of 10