Advanced Search
Results: Displaying 10 of 100 on page 1 of 10
Name
Title
Area
Document
Colleges
Year
Hierarchical certificateless criptographic key agreement
Key-compression techniques for isogeny-based cryptosystems
Knowledge-based interaction protocols: implementation of JamSession platform
Traces of the language, traces of order: the configuration of prescriptivism in the...
Perception of domestic food handlers in relation to the five Keys to safer food,...
Lyra: password-based key derivation with tunable memory and processing costs
Energy, capitalism and sustainable energy: keys for a paradigm breach
Optimization of the service restoration process in large scale distribution systems...
Results: Displaying 10 of 100 on page 1 of 10