熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 6 筆, 頁數 1 / 1
呈現:
Perfect Secrecy in Iot: A Hybrid Combinatorial-Boolean Approach
|
|||
Perfect Secrecy in Iot: A Hybrid Combinatorial-Boolean Approach
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure ... more |
|||
Restricted Congruences in Computing
Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Develop... more |
|||
Statistical Trend Analysis of Physically Unclonable Functions: An Approach Via Text Mining
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of mat... more |
|||
Restricted Congruences in Computing
Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Develop... more |
|||
Real-Time and Embedded Systems: Life Cycle, Ecosystem and Scheduling Trends
Real-time and Embedded Systems: Life Cycle, Ecosystem and Scheduling Trends establishes life cycles ... more |