Filter your results
- 12
- 12
- 12
- 11
- 2
- 7
- 2
- 1
- 12
- 1
- 12
- 6
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Efficient DVFS to Prevent Hard Faults for Many-Core Architectures2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.674-679, ⟨10.1007/978-3-642-55032-4_69⟩
Conference papers
hal-01397285v1
|
||
|
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.282-285, ⟨10.1007/978-3-319-24315-3_29⟩
Conference papers
hal-01466229v1
|
||
|
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.393-407
Conference papers
hal-01506576v1
|
||
|
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers
hal-01480204v1
|
||
|
An Efficient Unsavory Data Detection Method for Internet Big Data3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.213-220, ⟨10.1007/978-3-319-24315-3_21⟩
Conference papers
hal-01466222v1
|
||
|
A Semantic-Based Malware Detection System Design Based on Channels2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.653-662, ⟨10.1007/978-3-642-55032-4_67⟩
Conference papers
hal-01397283v1
|
||
|
An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.663-673, ⟨10.1007/978-3-642-55032-4_68⟩
Conference papers
hal-01397284v1
|
||
|
Improving Availability through Energy-Saving Optimization in LEO Satellite Networks2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.680-689, ⟨10.1007/978-3-642-55032-4_70⟩
Conference papers
hal-01397287v1
|
||
|
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion ControlInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.488-500, ⟨10.1007/978-3-642-32498-7_37⟩
Conference papers
hal-01542435v1
|
||
|
Towards a Key Consuming Detection in QKD-VoIP SystemsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.281-285, ⟨10.1007/978-3-319-10975-6_22⟩
Conference papers
hal-01404007v1
|
||
|
A High-Speed Network Content Filtering SystemInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers
hal-01404003v1
|
||
|
A Pipeline Optimization Model for QKD Post-processing System2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.472-481, ⟨10.1007/978-3-642-55032-4_48⟩
Conference papers
hal-01397256v1
|