Crypto Anarchy, Cyberstates, and Pirate Utopias
In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...
Photo-Induced Metastability in Amorphous Semiconductors
As far as I know, the systematic study on chalcogenide glasses as semiconductors was initiated
around the 1950s by a research group headed by B.T. Kolomiets of the Ioffe Physico-Technical
Institute. During the half-century that followed, amorphous semiconductors have acquired
their own citizenship as an unchallenged, independent area of...
Cryptographic Boolean Functions and Applications Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).
Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean...
|Result Page: 10 9 8 7 6 5 4 3 2 1 |