-
1
-
-
28444458526
-
Measuring energy-security tradeoffs in wireless networks
-
Phoenix, Arizona, USA, IEEE
-
F. C. C. Osorio, E. Agu, K. McKay, "Measuring energy-security tradeoffs in wireless networks", in Proc. of the 24th IEEE Int. Performance Computing and Communications Conference (IPCCC 2005), Phoenix, Arizona, USA, IEEE, 2005, pp. 293-302. [Online]. Available: http://dx.doi.org/10.1109/PCCC. 2005.1460572
-
(2005)
Proc. of the 24th IEEE Int. Performance Computing and Communications Conference (IPCCC 2005)
, pp. 293-302
-
-
Osorio, F.C.C.1
Agu, E.2
McKay, K.3
-
2
-
-
77955632799
-
Embedded program specialization for multiple criteria trade-offs
-
R. Damaševičius, V. Štuikys, E. Toldinas, "Embedded program specialization for multiple criteria trade-offs", Elektronika ir Elektrotechnika (Electronics and Electrical Engineering), no. 8, pp. 9-14, 2008.
-
(2008)
Elektronika Ir Elektrotechnika (Electronics and Electrical Engineering)
, Issue.8
, pp. 9-14
-
-
Damaševičius, R.1
Štuikys, V.2
Toldinas, E.3
-
3
-
-
79960280087
-
Hashing techniques for mobile device forensics
-
S. Danker, R. Ayers, R. P. Mislan, "Hashing Techniques for Mobile Device Forensics", "Small Scale Digital Device Forensics Journal". vol. 1, no. 3, 2009.
-
(2009)
Small Scale Digital Device Forensics Journal
, vol.1
, Issue.3
-
-
Danker, S.1
Ayers, R.2
Mislan, R.P.3
-
5
-
-
78249280311
-
Evaluation of randomness test results for short sequences
-
Springer-Verlag
-
F. Sulak, A. Doganaksoy, B. Ege, O. Kocak, "Evaluation of randomness test results for short sequences", in Proc. of the 6th Int. Conf. on Sequences and their applications (SETA'10), Springer-Verlag, 2010, pp. 309-319.
-
(2010)
Proc. of the 6th Int. Conf. on Sequences and Their Applications (SETA'10)
, pp. 309-319
-
-
Sulak, F.1
Doganaksoy, A.2
Ege, B.3
Kocak, O.4
-
6
-
-
30744457437
-
Hash function balance and its impact on birthday attacks
-
Interlaken, Switzerland, LNCS
-
M. Bellare, T. Kohno, "Hash Function Balance and Its Impact on Birthday Attacks", in Proc. of the Int. Conf. on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004), Interlaken, Switzerland, LNCS, vol. 3027, 2004, pp. 401-418.
-
(2004)
Proc. of the Int. Conf. on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004)
, vol.3027
, pp. 401-418
-
-
Bellare, M.1
Kohno, T.2
-
7
-
-
30344451674
-
Energy scalable universal hashing
-
J.-P. Kaps, K. Yuksel, B. Sunar, "Energy Scalable Universal Hashing", IEEE Transactions on Computers, vol. 12, no. 54, pp. 1484-1495, 2005. [Online]. Available: http://dx.doi.org/10.1109/TC.2005.195
-
(2005)
IEEE Transactions on Computers
, vol.12
, Issue.54
, pp. 1484-1495
-
-
Kaps, J.-P.1
Yuksel, K.2
Sunar, B.3
-
8
-
-
70449382811
-
Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?
-
IEEE Computer Society
-
X. Ruan, A. Manzanares, S. Yin, M. Nijim, X. Qin, "Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?", in Proc. of the 2009 IEEE Int. Conf. on Networking, Architecture, and Storage (NAS 09), IEEE Computer Society, 2009, pp. 413-420.
-
(2009)
Proc. of the 2009 IEEE Int. Conf. on Networking, Architecture, and Storage (NAS 09)
, pp. 413-420
-
-
Ruan, X.1
Manzanares, A.2
Yin, S.3
Nijim, M.4
Qin, X.5
|