and School

Results: 192003



#Item
51Cryptography / Post-quantum cryptography / Public-key cryptography / XMSS / Power analysis / Random number generation / Side-channel attack / Cryptographic hash function / Quantum cryptography / RSA / Digital signature / Pseudorandom number generator

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer 16 April 2018 CRYPTACUS Training School,

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-09 08:49:55
52Graph theory / Mathematics / Graph operations / Graph coloring / Line graph / Graph / End / Ear decomposition / Edge contraction / Shortest Path Faster Algorithm

Wiener Indices and Polynomials of Five Graph Operators Weigen Yan∗ School of Sciences, Jimei University Xiamen, China, and Academia Sinica Taipei, Taiwan

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:37
53Computing / Software / Video game publishers / Economy of China / Entertainment Software Association / Online marketplaces / E-commerce / ITunes / App Store / Google Play / WeChat / Nintendo

Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Jeffrey Knockel1,2 , Lotus Ruan1 , and Masashi Crete-Nishihata1 1 Citizen Lab, Munk School of Global Affairs, University of Toronto

Add to Reading List

Source URL: www.usenix.org

Language: English
54Economy / Supply chain management / Business / Contract law / Kitchen / Product return / Warranty / Inventory / Consumer electronics / Logistics / Forecasting

Reverse Logistics for Consumer Electronics: Forecasting Failures, Managing Inventory, and Matching Warranties by Andre du Pin Calmon Submitted to the Sloan School of Management

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2015-05-28 18:02:48
55Economy / Finance / Money / Actuarial science / Financial risk / Financial markets / China Health and Nutrition Survey / Health in China / Systematic risk / Risk aversion / Economics / Risk

Heterogeneous preferences and risk sharing at household level in China Jennifer T. Lai School of Finance, Guangdong University of Foreign Studies Isabel K. M. Yan

Add to Reading List

Source URL: www.hkimr.org

Language: English - Date: 2018-02-09 01:16:49
56Computer programming / Computing / Software engineering / Widget toolkits / Functional programming / Graphical user interfaces / Application programming interfaces / Evaluation strategy / Reactive programming / Widget / Functional reactive programming / Tk

Bridging the GUI Gap with Reactive Values and Relations Ivan Perez Henrik Nilsson School of Computer Science

Add to Reading List

Source URL: www.cs.nott.ac.uk

Language: English - Date: 2018-10-16 07:48:38
57Social enterprise / Sustainable Development Goals / Master of Enterprise / Global politics / World / Economy / UNESCO / Social Enterprise Academy-Nigeria / Center for Sustainable Global Enterprise

Understanding Social Enterprise & the Sustainable Development Goals • Understand key concepts and values of social enterprise • Gain vital skills and knowledge to set up a social enterprise in your school • S

Add to Reading List

Source URL: www.scotdec.org.uk

Language: English - Date: 2018-10-04 05:58:54
58Abstract data types / Queue / Double-ended queue / Dequeue / Statistical theory / Probability and statistics / Economy

Amortised Resource Analysis and Functional Correctness with Separation Logic (Part II) Summer School on Formal Reasoning and Representation of Complex Systems

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-08-26 04:16:32
59System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
60Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key size / Elliptic-curve cryptography / Public-key cryptography / NTRU / RSA

Post-quantum crypto Summary and recommendations Tanja Lange Technische Universiteit Eindhoven 28 September 2018

Add to Reading List

Source URL: nis-summer-school.enisa.europa.eu

Language: English - Date: 2018-10-01 09:10:12
UPDATE