<--- Back to Details
First PageDocument Content
Load balancing / Network management / Routing / Computing / Server / Hardware
Date: 2013-05-01 14:58:19
Load balancing
Network management
Routing
Computing
Server
Hardware

FY14 UTSF Project Funding Request SummaryProject Number

Add to Reading List

Source URL: it.okstate.edu

Download Document from Source Website

File Size: 107,23 KB

Share Document on Facebook

Similar Documents

Cryptography / Computer security / Computer hardware / Cyberwarfare / ISO standards / Hardware Trojan / Hardware security module / Secure cryptoprocessor / Hardware security / Trusted Platform Module / Smart card

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

DocID: 1xW1l - View Document

Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di

DocID: 1xVVy - View Document

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document

Algebra / Abstract algebra / Mathematics / Finite fields / Integer factorization algorithms / Elliptic curves / Group theory / Lenstra elliptic-curve factorization / Elliptic curve / Elliptic curve primality / Factorization of polynomials over finite fields

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Cryptography / Computer security / Computer hardware / Hardware security module / Hardware security / Tamper resistance

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

DocID: 1xVDt - View Document