Skip to search formSkip to main contentSkip to account menu

Secure - resin cement

Known as: Secure resin cement, secure, secures 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Many studies have been done with the security of cloud computing. Data encryption is one of typical approaches. However, complex… 
2015
2015
Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan… 
2014
2014
In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation (SMC) problem… 
2014
2014
The concept of privacy is expressed as release of information in a controlled way. Privacy could also be defined as privacy… 
2012
2012
For the last decade, perhaps the most commonly used type of end-user security has been the HTTP Secure (HTTPS) protocol employed… 
Review
2012
Review
2012
  • D. K. Mishra
  • 2012
  • Corpus ID: 44356267
Summary form only given. Sometimes the physically distributed computing devices in a network may be interested in computing some… 
2011
2011
Secure routing is an important issue in MANETs. Routing protocols can have vulnerabilities that may be exploited by malicious… 
2010
2010
A multi-mode Secure Hashing Algorithm (SHA) accelerator is fabricated in 45nm CMOS and occupies 0.0625mm2 with 18Gbps throughput… 
2008
2008
Many Secure RTP (SRTP) key exchange mechanisms do not disclose the SRTP session keys to intermediate SIP proxies. Howevr, these… 
1987
1987
A noninterference formulation ofMLS applicable tothe Secure AdanTarget (SAT)Abstract Modelisdeveloped. Ananalogous formulation…