Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,078,551 papers from all fields of science
Search
Sign In
Create Free Account
Secure - resin cement
Known as:
Secure resin cement
, secure
, secures
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Resin Cements
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
New Privacy Preserving Back Propagation Learning for Secure Multiparty Computation
H. Miyajima
,
Noritaka Shigei
,
H. Miyajima
,
Y. Miyanishi
,
S. Kitagami
,
N. Shiratori
2016
Corpus ID: 46736457
Many studies have been done with the security of cloud computing. Data encryption is one of typical approaches. However, complex…
Expand
2015
2015
Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java
K. Aryasa
,
Yesaya Tommy Paulus
2015
Corpus ID: 64253616
Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan…
Expand
2014
2014
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
Sankita J. Patel
,
Ankit Chouhan
,
D. Jinwala
2014
Corpus ID: 46136773
In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation (SMC) problem…
Expand
2014
2014
Privacy Preserving Data Publishing: A Classification Perspective
A. Zaman
,
C. Obimbo
2014
Corpus ID: 34504303
The concept of privacy is expressed as release of information in a controlled way. Privacy could also be defined as privacy…
Expand
2012
2012
Reducing the X . 509 Attack Surface with DNSSEC ’ s DANE
E. Osterweil
,
B. Kaliski
,
M. Larson
,
D. McPherson
2012
Corpus ID: 18353694
For the last decade, perhaps the most commonly used type of end-user security has been the HTTP Secure (HTTPS) protocol employed…
Expand
Review
2012
Review
2012
Tutorial: Privacy Preservation in MANET: Issues and Challenges
D. K. Mishra
Third International Conference on Intelligent…
2012
Corpus ID: 44356267
Summary form only given. Sometimes the physically distributed computing devices in a network may be interested in computing some…
Expand
2011
2011
Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons
F. Maan
,
Y. Abbas
,
N. Mazhar
Wireless Advanced
2011
Corpus ID: 23755685
Secure routing is an important issue in MANETs. Routing protocols can have vulnerabilities that may be exploited by malicious…
Expand
2010
2010
18Gbps, 50mW reconfigurable multi-mode SHA Hashing accelerator in 45nm CMOS
R. Ramanarayanan
,
S. Mathew
,
+7 authors
R. Krishnamurthy
Proceedings of ESSCIRC
2010
Corpus ID: 28515086
A multi-mode Secure Hashing Algorithm (SHA) accelerator is fabricated in 45nm CMOS and occupies 0.0625mm2 with 18Gbps throughput…
Expand
2008
2008
Secure Media Recording and Transcoding with the Session Initiation Protocol
D. Wing
,
S. Fries
,
F. Audet
,
A. Johnston
,
H. Tschofenig
2008
Corpus ID: 63535320
Many Secure RTP (SRTP) key exchange mechanisms do not disclose the SRTP session keys to intermediate SIP proxies. Howevr, these…
Expand
1987
1987
Extending theNoninterference Versionof MLS
J. Haigh
,
W. D. Young
1987
Corpus ID: 61416983
A noninterference formulation ofMLS applicable tothe Secure AdanTarget (SAT)Abstract Modelisdeveloped. Ananalogous formulation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE