×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [random r]
SAC TRECK 2008
773 views
Lower and Upper Bounds on Obtaining History Independence Niv Buchbinder and Erez Petrank Technion, Israel
215 views
PowerPoint Slides (PPT)
784 views
C Sharp Jn (3)
816 views
Attribute Based Encryption with Privacy Preserving In Clouds
76 views
1 February 10, 2014 Presented By: Michael E. Parker, P.E. Parker Environmental and Consulting, LLC Hydraulic Fracturing Best Management Practices Comments
218 views
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography
225 views
1 How to securely outsource cryptographic computations Susan Hohenberger and Anna Lysyanskaya TCC2005
215 views
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie
221 views
A Generic Approach for Generating Interesting Interactive Pac-Man Opponents 作者 :Georgios N.Yannakakis & John Hallam
214 views
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
213 views
1 Hardware-Based Implementations of Factoring Algorithms Factoring Large Numbers with the TWIRL Device Adi Shamir, Eran Tromer Analysis of Bernstein’s
223 views
Next >