Lecture Notes in Computer Science

Results: 278



#Item
31

In: O. Danvy, R. Gl uck, P. Thiemann, editors, Partial Evaluation, International Seminar, Dagstuhl Castle, Germany, February 12{16, 1996, Lecture Notes in Computer Science 1110, Springer, A Theory of Logic Program

Add to Reading List

Source URL: repository.readscheme.org

- Date: 2010-10-22 08:04:37
    32

    Lecture Notes in Computer Science:

    Add to Reading List

    Source URL: legacy.alexandria.ucsb.edu

    - Date: 2004-09-27 12:46:00
      33

      Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      - Date: 2004-02-12 14:18:41
        34Prevention / Safety / Probability / Risk / Actuarial science / Security / Disaster preparedness / Humanitarian aid / Risk management / Vulnerability assessment / Social vulnerability / Disaster risk reduction

        Lecture Notes in Computer Science:

        Add to Reading List

        Source URL: www.codata-germany.org

        Language: English - Date: 2014-06-10 04:40:56
        35Security / Prevention / Cyberwarfare / Cybercrime / National security / Safety / Computer security / Cyber-security regulation / Politics and technology / International Federation for Information Processing / Cyber / Lecture Notes in Computer Science

        TYLER MOORE Tandy Assistant Professor of Cyber Security and Information Assurance University of Tulsa, Tulsa, OKemail: http://tylermoore.ens.utulsa.edu/ tel: +

        Add to Reading List

        Source URL: tylermoore.ens.utulsa.edu

        Language: English - Date: 2016-03-24 11:13:01
        36Public sphere / Publishing / Mass media / Lecture Notes in Computer Science / Springer Science+Business Media / Email / Search engine indexing / Screenplay / Index / Book design / LaTeX

        Lecture Notes in Computer Science: Authors’ Instructions for the Preparation

        Add to Reading List

        Source URL: www.worldcist.org

        Language: English - Date: 2016-07-08 17:39:21
        37Evolution / Academia / Cybernetics / Aquatic ecology / Behavior / Swarm behaviour / Zoology / Ant colony optimization algorithms / Evolutionary computation / Lecture Notes in Computer Science / Swarm intelligence / Algorithmic Number Theory Symposium

        Publications Daniel Merkle Submitted [FFM+ 13] Fagerberg, R., C. Flamm, D. Merkle, P. Peters and P.F. Stadler: On the Complexity of Reconstructing Chemical Reaction Networkssubmitted. Books [BM11] Blum, C. and D.

        Add to Reading List

        Source URL: www.imada.sdu.dk

        Language: English - Date: 2013-09-06 03:51:46
        38Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

        An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2007-08-20 03:23:28
        39Association for Computing Machinery / Ambient intelligence / Symposium on Applied Computing / International Federation for Information Processing / Lecture Notes in Computer Science / Academia / Computing / Structure

        Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D6.1 (M42)

        Add to Reading List

        Source URL: websand.eu

        Language: English - Date: 2015-05-06 05:08:52
        40Software engineering / Computer programming / Software development / Programming idioms / Computability theory / Functional programming / Theoretical computer science / Logic programming / Unfolding / Recursion / Free variables and bound variables / Symbolic computation

        In: Partial Evaluation, International Seminar, Dagstuhl Castle, Germany, February 1996, Lecture Notes in Computer Science 1110, Springer, 1996 ppInvited paper) A Comparative Revisitation of Some Program Tran

        Add to Reading List

        Source URL: repository.readscheme.org

        Language: English - Date: 2010-10-22 08:04:37
        UPDATE