Hardware

Results: 39400



#Item
51Desbloqueando riqueza desde la Blockchain hacia Todos  5M White Paper Esquema de Tokens de Seguridad (TSS) incorporando Módulos de Seguridad de Hardware

Desbloqueando riqueza desde la Blockchain hacia Todos 5M White Paper Esquema de Tokens de Seguridad (TSS) incorporando Módulos de Seguridad de Hardware

Add to Reading List

Source URL: www.tsstoken.com

Language: Spanish - Date: 2017-10-26 15:45:56
    52Specialized Hardware for Read Mapping Tim Smith (tsmith@cs   

    Specialized Hardware for Read Mapping Tim Smith (tsmith@cs  

    Add to Reading List

    Source URL: www.cs.utoronto.ca

    Language: English - Date: 2008-02-29 00:01:56
      53Summary of Changes Made Between MSA Software version 115 and versionUSB Interface The MSA hardware may now be interfaced to the computer by means of USB. Information on installing the necessary driver is po

      Summary of Changes Made Between MSA Software version 115 and versionUSB Interface The MSA hardware may now be interfaced to the computer by means of USB. Information on installing the necessary driver is po

      Add to Reading List

      Source URL: www.wetterlin.org

      Language: English - Date: 2010-12-31 06:52:44
        54Real-Time Skin Rendering on Graphics Hardware Pedro V. Sander* David Gosselin†  Jason L. Mitchell‡

        Real-Time Skin Rendering on Graphics Hardware Pedro V. Sander* David Gosselin† Jason L. Mitchell‡

        Add to Reading List

        Source URL: developer.amd.com

        Language: English - Date: 2013-10-25 00:25:52
          55™  AN INTEL COMPANY WIND RIVER SIMICS Electronic systems are becoming increasingly complex, with more hardware, more software,

          ™ AN INTEL COMPANY WIND RIVER SIMICS Electronic systems are becoming increasingly complex, with more hardware, more software,

          Add to Reading List

          Source URL: www.rtlinux.org

          Language: English - Date: 2018-06-06 06:00:52
            56Private Circuits: Securing Hardware against Probing Attacks Yuval Ishai1 , Amit Sahai2 , and David Wagner3 1  Technion — Israel Institute of Technology,†

            Private Circuits: Securing Hardware against Probing Attacks Yuval Ishai1 , Amit Sahai2 , and David Wagner3 1 Technion — Israel Institute of Technology,†

            Add to Reading List

            Source URL: www.cs.technion.ac.il

            Language: English - Date: 2013-02-25 01:38:37
              57Verifying Quantitative Reliability of Programs That Execute on Unreliable Hardware (Appendix) Michael Carbin Sasa Misailovic

              Verifying Quantitative Reliability of Programs That Execute on Unreliable Hardware (Appendix) Michael Carbin Sasa Misailovic

              Add to Reading List

              Source URL: groups.csail.mit.edu

              Language: English - Date: 2013-10-28 12:00:37
                58Stateful OpenFlow: Hardware Proof of Concept Marco	
  Bonola,	
  CNIT/University	
  of	
  Roma	
  “Tor	
  Vergata”	
   HPSR	
  ’15	
   	
  -­‐	
  Budapest,	
  Hungary	
  

                Stateful OpenFlow: Hardware Proof of Concept Marco  Bonola,  CNIT/University  of  Roma  “Tor  Vergata”   HPSR  ’15    -­‐  Budapest,  Hungary  

                Add to Reading List

                Source URL: www.beba-project.eu

                Language: English - Date: 2015-11-02 06:08:39
                  59Cryptographic Hardware and Embedded Systems (CHES) CHES 2018, Amsterdam, September 9–12, 2018 IACR Transactions on CHES (TCHES), Volume 2018, Issues 1–3 Image source: Xabier Zaldua, https://www.flickr.com/photos/zald

                  Cryptographic Hardware and Embedded Systems (CHES) CHES 2018, Amsterdam, September 9–12, 2018 IACR Transactions on CHES (TCHES), Volume 2018, Issues 1–3 Image source: Xabier Zaldua, https://www.flickr.com/photos/zald

                  Add to Reading List

                  Source URL: ches.iacr.org

                  Language: English - Date: 2018-07-02 01:04:42
                    60TPM Genie Attacking the Hardware Root of Trust For Less Than $50 Introduction Jeremy Boone @uffeux

                    TPM Genie Attacking the Hardware Root of Trust For Less Than $50 Introduction Jeremy Boone @uffeux

                    Add to Reading List

                    Source URL: cansecwest.com

                    Language: English - Date: 2018-03-29 14:38:12