Data redundancy

Results: 134



#Item
1Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard Pedro Peris-Lopez1 Tieyan Li2 Tong-Lee Lim2 Julio C. Hernandez-Castro1 Juan M. Estevez-Tapiador1 1 Computer

Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard Pedro Peris-Lopez1 Tieyan Li2 Tong-Lee Lim2 Julio C. Hernandez-Castro1 Juan M. Estevez-Tapiador1 1 Computer

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:29:59
2ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-15 08:13:39
3GB-HA4) Printed on Oct 8, ’99 Data Transmission Specifications 3S4YR-MVFW(DL)-0** Series Hybrid Card Reader/Writer

GB-HA4) Printed on Oct 8, ’99 Data Transmission Specifications 3S4YR-MVFW(DL)-0** Series Hybrid Card Reader/Writer

Add to Reading List

Source URL: secdev.zoller.lu

Language: English - Date: 2009-02-23 10:28:26
4Randomly Sampling Maximal Itemsets Sandy Moens and Bart Goethals Frequent Itemset Mining •  Finding interesting patterns by e.g. support

Randomly Sampling Maximal Itemsets Sandy Moens and Bart Goethals Frequent Itemset Mining •  Finding interesting patterns by e.g. support

Add to Reading List

Source URL: poloclub.gatech.edu

Language: English - Date: 2013-08-20 15:05:09
5Netfilter Failover Connection Tracking State Replication Krisztián Kovács <>

Netfilter Failover Connection Tracking State Replication Krisztián Kovács <>

Add to Reading List

Source URL: people.netfilter.org

Language: English - Date: 2004-07-05 06:06:19
6scalability redundancy & availability fast access Storage Device Characteristics

scalability redundancy & availability fast access Storage Device Characteristics

Add to Reading List

Source URL: bigdatascienceschool.com

Language: English - Date: 2016-06-06 18:10:05
7PREFACE  The “Singapore Yearbook of Manpower Statistics” contains a wide range of statistics on the labour market. These include key data on the labour force, job vacancy, wages, redundancy, labour turnover, hours wo

PREFACE The “Singapore Yearbook of Manpower Statistics” contains a wide range of statistics on the labour market. These include key data on the labour force, job vacancy, wages, redundancy, labour turnover, hours wo

Add to Reading List

Source URL: stats.mom.gov.sg

Language: English
8S P E E DS E R I E S  TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

S P E E DS E R I E S TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2016-03-01 18:42:38
9Edgar H. Sibley Panel Editor Cyclic Redundancy Check (CRC) codes provide a simple yet powerful method of error detection during digital data transmission. Use of a table look-up in computing the CRC bits will efficiently

Edgar H. Sibley Panel Editor Cyclic Redundancy Check (CRC) codes provide a simple yet powerful method of error detection during digital data transmission. Use of a table look-up in computing the CRC bits will efficiently

Add to Reading List

Source URL: www.ifp.illinois.edu

Language: English - Date: 2003-07-08 17:17:18
10Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20