Search

Your search keyword '"Frodo"' showing total 77 results

Search Constraints

Start Over You searched for: Descriptor "Frodo" Remove constraint Descriptor: "Frodo"
77 results on '"Frodo"'

Search Results

1. THE POSTTRAUMATIC STRESS DISORDER OF FRODO BAGGINS.

2. Key Mismatch Attack on ThreeBears, Frodo and Round5

3. Quantum Misuse Attack on Frodo.

4. Assessing the Feasibility of Single Trace Power Analysis of Frodo

5. Quantum Misuse Attack on Frodo

6. Three Dact gene family members are expressed during embryonic development and in the adult brains of mice

7. Standard Lattice-Based Key Encapsulation on Embedded Devices

8. Post Quantum Cryptography on FPGA

9. Post Quantum Cryptography on FPGA

10. Post Quantum Cryptography on FPGA

11. Post Quantum Cryptography on FPGA

12. Delamination of neural crest cells requires transient and reversible Wnt inhibition mediated by Dact1/2.

13. Dact genes are chordate specific regulators at the intersection of Wnt and Tgf-β signaling pathways.

14. Dact gene expression profiles suggest a role for this gene family in integrating Wnt and TGF-β signaling pathways during chicken limb development.

15. Frodo proteins: modulators of Wnt signaling in vertebrate development.

16. The involvement of Frodo in TCF-dependent signaling and neural tissue development.

17. Differences in non-LTR retrotransposons within C. elegans and C. briggsae genomes

18. Personnage secondaire ou second héros : la place paradoxale de Sam dans Le Seigneur des Anneaux

19. Standard Lattice-Based Key Encapsulation on Embedded Devices

20. Dact-4 is a Xenopus laevis Spemann organizer gene related to the Dapper/Frodo antagonist of β-catenin family of proteins.

21. Prestanda och jämförelse av kvantresistenta kryptoalgoritmer

22. Fictional space in the lord of the rings: frodo’s path through middle-earth

23. Elementi kršćanstva u Gospodaru prstenova i Beuwulfu

24. Performance and Comparison of post-quantum Cryptographic Algorithms

25. Delamination of neural crest cells requires transient and reversible Wnt inhibition mediated by Dact1/2

26. Three Dact gene family members are expressed during embryonic development and in the adult brains of mice

27. Weirdies.

28. Gandalf : Thinker, Teacher, Mentor, Grouch

29. Monsters or Heroes?: The Inner Fight between Good and Evil of The Lord of the Rings' Characters

30. 'Please Mr Frodo, is this New Zealand? Or Australia?'... 'No Sam, it's Middle-earth.'

31. Distributed Constraint Optimization: Privacy Guarantees and Stochastic Uncertainty

32. Dact genes are chordate specific regulators at the intersection of Wnt and Tgf-β signaling pathways

33. Finding Courage in Unlikely Places: Processing War in J.R.R. Tolkien’s The Lord of the Rings

34. The Hobbit Habit.

35. Heroes, Gods, and Virtues: a comparison and contrast of the heroes in the Aeneid and The Lord of the Rings

36. Metody post-kvantové kryptografie

37. Post-kvantová kryptografie na omezených zařízeních

38. Postkvantová kryptografie na FPGA

39. Postkvantová kryptografie na FPGA

40. Post-kvantová kryptografie na omezených zařízeních

41. Metody post-kvantové kryptografie

42. Postkvantová kryptografie na FPGA

43. Post-kvantová kryptografie na omezených zařízeních

44. Metody post-kvantové kryptografie

45. Metody post-kvantové kryptografie

46. Post-kvantová kryptografie na omezených zařízeních

47. Postkvantová kryptografie na FPGA

48. Postkvantová kryptografie na FPGA

49. Post-kvantová kryptografie na omezených zařízeních

50. Metody post-kvantové kryptografie

Catalog

Books, media, physical & digital resources