Eugene

Results: 4981



#Item
671Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-10 13:39:42
672

CHAUMONT LYCEE EUGENE DECOMBLE Résultats cumulés des sessions Taux de bonnes réponses par question

Add to Reading List

Source URL: www.100minutespourlavie.fr

Language: French - Date: 2016-01-27 05:56:36
    673

    Quantifier Elimination via Clause Redundancy Eugene Goldberg and Panagiotis Manolios Northeastern University, USA, {eigold,pete}@ccs.neu.edu Abstract—We consider the problem of existential quantifier elimination for Bo

    Add to Reading List

    Source URL: eigold.tripod.com

    Language: English - Date: 2013-11-02 17:54:28
      674

      Timing Analysis with Implicitly Specified False Paths Eugene Goldberg Cadence Berkeley Labs, Berkeley,California

      Add to Reading List

      Source URL: eigold.tripod.com

      Language: English - Date: 2005-11-16 12:39:22
        675Get Here / Oral literature / Vocal music

        Eugene Kaspersky The Top-100 Must-See Places in the World

        Add to Reading List

        Source URL: eugene-kaspersky-wpengine.netdna-ssl.com

        Language: English - Date: 2015-10-30 14:35:30
        676

        Spring 2015 To: Parents/Guardians of Middle School Students From: South Eugene High School Science Department

        Add to Reading List

        Source URL: sehs.4j.lane.edu

        Language: English - Date: 2015-02-03 19:23:05
          677Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

          S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2007-07-26 16:56:51
          678

          Quantifier Elimination by Dependency Sequents Eugene Goldberg, Panagiotis Manolios arXiv:1201.5653v4 [cs.LO] 2 JunNortheastern University, USA {eigold,pete}@ccs.neu.edu

          Add to Reading List

          Source URL: eigold.tripod.com

          Language: English - Date: 2013-06-17 10:29:50
            679

            The 2600hz Project BY Eugene Liu August 10, 2010 Remember the good ol’ days when you could build (or buy) a blue box to make free longdistance phone calls? The blue box generates the 2600 Hz tone which instructs the ol

            Add to Reading List

            Source URL: www.2600hz.com

            Language: English - Date: 2014-05-27 07:48:08
              680

              Software for Quantifier Elimination in Propositional Logic Eugene Goldberg1 and Panagiotis Manolios2 1 Northeastern University, USA

              Add to Reading List

              Source URL: eigold.tripod.com

              Language: English - Date: 2014-09-14 04:33:44
                UPDATE