Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Deposit type : Fulltext
labStructName_s : Institute of Informatics
labStructName_s : Computer Science department [Herzliya]
Image document

On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

Udi Ben-Porat , Anat Bremler-Barr , Hanoch Levy , Bernhard Plattner
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.135-148, ⟨10.1007/978-3-642-30045-5_11⟩
Conference papers hal-01531139v1
Image document

A context-free linear ordering with an undecidable first-order theory

Arnaud Carayol , Zoltan Esik
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.104-118, ⟨10.1007/978-3-642-33475-7_8⟩
Conference papers hal-00733458v1