Nicholas

Results: 5905



#Item
951

175 YEARS – 50 GREAT CATHOLICS / Nicholas Rhea on Cardinal Hinsley In March 1943, our headmistress at St Hedda’s on the North York Moors,

Add to Reading List

Source URL: www.thetablet.co.uk

Language: English
    952Computer networking / Analytic geometry / Coordinate system / Node / Leader election / Distributed data storage / Pharos network coordinates

    The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems1 Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim University of Minnesota {dchantin, victor, hopper, kyd}@cs.umn.edu

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2011-08-18 16:52:52
    953

    The Urban Environment: History, Thought, and Practice G.E. Freshman Cluster Program – 21CW Spring 2010 – U.C.L.A. Instructor: Nicholas Bauch Email: Office: A-185 Bunche Hall

    Add to Reading List

    Source URL: www.nicholasbauch.com

    Language: English - Date: 2012-01-29 21:11:05
      954

      Geography 88GE: Geography of Food and Agriculture UCLA, Winter 2008 Instructor: Nicholas Bauch Meeting time: Tuesdays from 9:00-11:50 Email:

      Add to Reading List

      Source URL: www.nicholasbauch.com

      Language: English - Date: 2012-01-29 21:16:54
        955Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

        BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2010-12-16 18:40:43
        956Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

        Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2009-03-17 15:01:03
        957

        IMMORTALITY: LIBERTY’S FINAL FRONTIER DAVID NICHOLAS “If a mass death sentence defines man’s condition, then rebellion, in one sense is its contemporary.

        Add to Reading List

        Source URL: www.libertarian.co.uk

        Language: English - Date: 2014-10-22 06:32:11
          958Distributed data storage / Computing / Concurrent computing / File sharing / Distributed computing / Network architecture / Peer-to-peer computing / Peer-to-peer / Pastry / Scalability / Chord / Distributed hash table

          Robust Accounting in Decentralized P2P Storage Systems Ivan Osipkov Peng Wang Nicholas Hopper Yongdae Kim

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2006-11-10 14:24:54
          959

          ALL KEY STAGES PERFORMANCE Image: Justin Nicholas

          Add to Reading List

          Source URL: www.nnfestival.org.uk

          Language: English - Date: 2015-02-24 12:27:29
            960Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

            Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2013-09-04 15:59:08
            UPDATE