Nicholas

Results: 5905



#Item
931

Timed-Release and Key-Insulated Public Key Encryption Jung Hee Cheon1 , Nicholas Hopper2 , Yongdae Kim2 , Ivan Osipkov2? 1 2

Add to Reading List

Source URL: syssec.kaist.ac.kr

Language: English - Date: 2012-09-03 21:42:57
    932

    Methods for Efficient Network Coding Petar Maymounkov and Nicholas J. A. Harvey Desmond S. Lun Computer Science and Artificial Intelligence Laboratory

    Add to Reading List

    Source URL: crab.rutgers.edu

    Language: English - Date: 2010-08-24 11:03:35
      933

      Myrmic: Secure and Robust DHT Routing Peng Wang, Nicholas Hopper, Ivan Osipkov and Yongdae Kim ABSTRACT implications, it is natural to expect that if they become popular, they will be targeted by adversaries who can cont

      Add to Reading List

      Source URL: syssec.kaist.ac.kr

      Language: English - Date: 2012-09-03 21:43:01
        934

          CURRICULUM  VITAE   NICHOLAS  E.  KOLOKOTRONIS  

        Add to Reading List

        Source URL: users.uop.gr

        Language: English - Date: 2013-01-16 12:50:06
          935

          Recruiting New Tor Relays with BRAIDS Rob Jansen Nicholas Hopper Yongdae Kim

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2010-08-16 11:42:16
            936Cryptography / Public-key cryptography / Electronic documents / Dining cryptographers problem / Communications protocol / Crowds / Email / Group signature / Anonymity / Anonymous remailer / Digital signature

            Selectively Traceable Anonymity Luis von Ahn1 , Andrew Bortz2 , Nicholas J. Hopper3 , and Kevin O’Neill4 1 Carnegie Mellon University, Pittsburgh, PA USA 2

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2006-10-27 09:31:40
            937

            As you may remember, Taylor Blanc reached this pinnacle in 2010, by creating a general veterans memorial at the Wallula cemetery. Nicholas will be adding onto Taylor’s project by inlaying a memorial specifically dedica

            Add to Reading List

            Source URL: www.csd400.org

            Language: English - Date: 2015-07-07 14:07:07
              938Academia / Artificial intelligence / Cognitive science / Computational neuroscience / Human-based computation / CAPTCHA / Computer security / Computer vision / Philosophy of artificial intelligence / Internet bot / Turing test / Artificial general intelligence

              CAPTCHA: Using Hard AI Problems For Security Luis von Ahn1 , Manuel Blum1 , Nicholas J. Hopper1 , and John Langford2 1 Computer Science Dept., Carnegie Mellon University, Pittsburgh PA 15213, USA

              Add to Reading List

              Source URL: www-users.cs.umn.edu

              Language: English - Date: 2004-09-08 16:39:25
              939

              1267 Threat and decline in fishes: an indicator of marine biodiversity Nicholas K. Dulvy, Simon Jennings, Stuart I. Rogers, and David L. Maxwell

              Add to Reading List

              Source URL: www.dulvy.com

              Language: English - Date: 2014-04-25 12:46:55
                940

                The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems ERIC CHAN-TIN, Oklahoma State University VICTOR HEORHIADI, NICHOLAS HOPPER, and YONGDAE KIM, University of Minnesota A network coordinate system

                Add to Reading List

                Source URL: syssec.kaist.ac.kr

                Language: English - Date: 2015-03-19 04:19:59
                  UPDATE