by
Mukhopadhyay, Debdeep.
Format:
Books
Publication Date
2015
Excerpt:
. Hardware intellectual property protection -- 5. Hardware trojans -- 6. Physically unclonable functions.
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
-- 6.1.Introduction -- 6.2.Data Backup -- 6.3.Firewalls -- 6.3.1.Function of a Firewall -- 6.3.2.What
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
.2.Definition of Cryptographic Hash Function / D. Gligoroski -- 4.3.Iterated Hash Functions / D
Limit Search Results
Narrowed by: