Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure Digital

Known as: UHS, MicroSDHC card, MicroSDXC 
Secure Digital (SD) is a non-volatile memory card format developed by the SD Card Association (SDA) for use in portable devices. The standard was… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
In the era of the Internet of Things (IoT), an enormous amount of sensing devices collect and/or generate various sensory data… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The Pierre Auger Collaboration has reported evidence for anisotropies in the arrival directions of cosmic rays with energies… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
A common goal of dynamic structural analysis is to predict the response of a structure subjected to ground motions having a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Previous research has demonstrated that attending center care is associated with cognitive benefits for young children. However… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We utilize graphical representations of Dictator Games which generate rich individual- level data. Our baseline experiment… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We propose a system that improves the performance of streaming media CDN by exploiting the path diversity provided by existing… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We improve the Bellare-Miner (Crypto '99) construction of signature schemes with forward security in the random oracle model. Our… Expand
  • figure 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe a digital signature scheme in which the public key is fixed but the secret signing key is updated at regular… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Much research in theoretical cryptography has been centered around finding the weakest possible cryptographic assumptions… Expand
Is this relevant?