Search results for: Bjorn Sutter
Lecture Notes in Computer Science > Information Security Applications > DRM/Software Security > 194-206
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Privacy and Digital Rights > 152-165
Lecture Notes in Computer Science > High Performance Embedded Architectures and Compilers > IIa Reconfigurable - ASIP > 66-81
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Steganography > 425-439
Lecture Notes in Computer Science > Reconfigurable Computing: Architectures, Tools and Applications > Posters > 364-371
Lecture Notes in Computer Science > Reconfigurable Computing: Architectures and Applications > Tools > 425-430
Lecture Notes in Computer Science > Euro-Par 2004 Parallel Processing > Topic 4: Compilers for High Performance > 284-291
International Journal of Information Security > 2016 > 15 > 2 > 111-130