UCSD

Results: 13008



#Item
1Sponsor / Robert Byrd / United States / LGBT law in the United States / LGBT rights in the United States / West Virginia / 111th United States Congress

doi:j.socnet

Add to Reading List

Source URL: fowler.ucsd.edu

Language: English - Date: 2006-11-07 01:31:57
2Computing / Open formats / RSS / Computer file formats / Data types / Cloud computing / Atom / News aggregator / Pointer swizzling / Pointer / Computer data storage / Cloudlet

SLIM: Mmap from the Cloud to Device, and Back Jinghao Shi◦ Mingyuan Xia† Ming Wu‡ Lintao Zhang‡ Zheng Zhang‡ ◦ University of Science and Technology of China

Add to Reading List

Source URL: apsys11.ucsd.edu

Language: English - Date: 2011-07-04 13:02:25
3Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
4Denial-of-service attacks / Cyberwarfare / Computing / Computer security / Denial-of-service attack / Transmission Control Protocol / IP address spoofing / SYN flood / Ping / Port scanner / LAND / UDP flood attack

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-05-18 13:11:42
5Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
6Graph theory / Network theory / Mathematics / Discrete mathematics / Networks / Algebraic graph theory / Centrality / Network analysis / Sponsor / Betweenness centrality / Legislator

Political Analysis:456–487 doi:pan/mpl002 Advance Access publication June 30, 2006 Connecting the Congress: A Study of

Add to Reading List

Source URL: fowler.ucsd.edu

Language: English - Date: 2012-11-29 08:29:34
7Cryptography / Public-key cryptography / Computational complexity theory / Zero-knowledge proof / Proof of knowledge / Commitment scheme / Non-interactive zero-knowledge proof / IP / Cryptographic protocol / NP / RSA / Zero knowledge

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-06-18 19:02:40
8Computing / Computer arithmetic / Mathematics / Numerical analysis / Software engineering / Mathematical analysis / Error / NaN / Nothing / Rounding / Type system / Computer algebra

Finding Root Causes of Floating Point Error

Add to Reading List

Source URL: herbgrind.ucsd.edu

Language: English - Date: 2018-06-21 11:23:19
9

PDF Document

Add to Reading List

Source URL: dsp.ucsd.edu

- Date: 2013-11-12 14:44:30
    10

    PDF Document

    Add to Reading List

    Source URL: preuss.ucsd.edu

    - Date: 2018-08-11 15:52:48
      UPDATE