Garg

Results: 220



#Item
71Computer security / Computing / Trusted computing / Cryptography / Trusted Execution Technology / X86 architecture / Trusted Platform Module / Monitor / Futures and promises / Trusted computing base / Polymerase chain reaction / Thread

A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2009-06-02 14:26:22
72

Analysis of ecrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer Vaibhav Garg, Chris Kanich, L. Jean Camp Abstract Research in the economics of security has contributed more than a decade of empirical fi

Add to Reading List

Source URL: cryptosec.ucsd.edu

Language: English - Date: 2012-08-09 18:17:38
    73

    A Simple Algorithm for Computing a Spiral Polygonization of a Finite Planar Set M. Ahsan, S. Cheruvatur, M. Gamboni, A. Garg, O. Grishin, S. Hashimoto, J. Jermsurawong, G. T. Toussaint, and L. Zhang Faculty of Science, N

    Add to Reading List

    Source URL: fwcg14.cse.uconn.edu

    Language: English - Date: 2014-10-29 21:34:14
      74

      As on March 2, 2015 Board of Governors, AcSIR (a) The Chairperson: Dr. R.A. Mashelkar (b) Vice Chairperson: Dr. M.O. Garg, DG, CSIR (c) President of INSA in ex-officio capacity: Prof. Raghavendra Gadagkar

      Add to Reading List

      Source URL: acsir.res.in

      Language: English - Date: 2015-03-02 07:08:40
        75

        A SATELLITE EDUSAT: CHANGING THE STATE OF EDUCATION IN INDIA Nidhi Garg INTRODUCTION

        Add to Reading List

        Source URL: linc.mit.edu

        Language: English - Date: 2014-07-24 17:10:59
          76

          Fifth International Workshop on SECurity and SOCial Networking 2013, San Diego (18 MarchStudying the Effectiveness of Android Application Permissions Requests Kevin Benton, L. Jean Camp, Vaibhav Garg School of In

          Add to Reading List

          Source URL: www.csee.usf.edu

          Language: English - Date: 2013-03-05 21:29:02
            77Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

            Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

            Add to Reading List

            Source URL: www.andrew.cmu.edu

            Language: English - Date: 2016-02-12 12:31:57
            78

            Seamless Fracture in a Production Pipeline Akash Garg⇤ Kyle Maxwell† DreamWorks Animation

            Add to Reading List

            Source URL: www1.cs.columbia.edu

            Language: English - Date: 2014-06-10 15:53:14
              79

              Agent-based Evacuation Modeling: Simulating the Los Angeles International Airport Jason Tsai, Emma Bowring, Shira Epstein, Natalie Fridman, Prakhar Garg, Gal Kaminka, Andrew Ogden, Milind Tambe, Matthew Taylor {jasontts@

              Add to Reading List

              Source URL: teamcore.usc.edu

              Language: English - Date: 2009-11-09 22:45:15
                80

                ARTICLES PUBLISHED ONLINE: 25 NOVEMBER 2012 | DOI: NCHEM.1504 Regioselective reactions of 3,4-pyridynes enabled by the aryne distortion model Adam E. Goetz and Neil K. Garg*

                Add to Reading List

                Source URL: www.chem.ucla.edu

                Language: English - Date: 2016-02-09 18:28:55
                  UPDATE