39,938 results
Search Results
2. Building Paper Industria
3. Transnational Capital and Paper Production
4. Capital Networks and Early Papermaking
5. Networked Industry Survival
6. Multidimensional Fairness in Paper Recommendation
7. Finding All Impossible Differentials When Considering the DDT
8. Key-Recovery Attacks on CRAFT and WARP
9. Problematisation, Narrative and Fiction in the Science Classroom
10. Thermal Stress State of a Massive Concrete Slab in the Winter Building Period
11. Neural Network Model for Quality Indicators Assessment: Case of Paper Manufacturing Industry
12. A Sponge-Based PRF with Good Multi-user Security
13. Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
14. Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARP
15. Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
16. A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair
17. Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge
18. On the Weakness of Ring-LWE mod Prime Ideal by Trace Map
19. Another Look at Differential-Linear Attacks
20. Profiling Side-Channel Attacks on Dilithium : A Small Bit-Fiddling Leak Breaks It All
21. Pseudo-Random Error-Correcting Codes in Network Coding
22. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks
23. Networked Capitalism
24. Assessing the Quality of Mentoring: Evidence-Based Development of a Training Programme for Biology Mentors and Pre-service Biology Teachers for Scientific Issues
25. Challenges Emerged During an Action Research Approach Applied in a Schoolgarden Project: Reflections and Revisions
26. Using Physical and Virtual Labs for Experimentation in STEM+ Education: From Theory and Research to Practice
27. Comparative Evaluation of Aluminum Alloys for the Manufacture of Connecting Systems in Building Structures
28. Compressive Strength Along and Across Wood Fibers Modified by a Polymer Composition with a Nanostructured Filler
29. Shear Crack Resistance of I-Shaped Concrete Beams with Basalt FRP Stirrups
30. Farasha: A Provable Permutation-Based Parallelizable PRF
31. Faster Cryptographic Hash Function from Supersingular Isogeny Graphs
32. From Plaintext-Extractability to IND-CCA Security
33. : Persistent and Distributed Key Acquisition for Secure Storage from Passwords
34. An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves
35. Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
36. Injective Rank Metric Trapdoor Functions with Homogeneous Errors
37. Improved Circuit-Based PSI via Equality Preserving Compression
38. Differential Analysis of the Ternary Hash Function Troika
39. 2DT-GLS: Faster and Exception-Free Scalar Multiplication in the GLS254 Binary Curve
40. Multilevel Edge Computing System for Autonomous Vehicles
41. Organization of Smart City Services Based on Microservice Architecture
42. Smart City Infrastructure Projects: Spatial Data of Risks
43. UAV-Based Edge Computing System for Smart City Applications
44. Development of Determining a Wireless Client Location Method in the IEEE 802.11 Network to Ensure the IT Infrastructure Security
45. Spatial Data of Smart Cities: Trust
46. Machine Learning–Based Identity and Access Management for Cloud Security
47. Energy-Efficient Beam Shaping in MIMO System Using Machine Learning
48. Machine Learning Techniques for Secure Edge SDN
49. Artificial Intelligence-Based Secure Edge Computing Systems for IoTDs and Smart Cities: A Survey
50. Big Data Analytics for Secure Edge-Based Manufacturing Internet of Things (MIoT)
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.