The following text field will produce suggestions that follow it as you type.

Barnes and Noble

Privately and Publicly Verifiable Computing Techniques: A Survey

Unfortunately, this item is no longer available, but we found some similar items you might like.
Accuracy Verification Methods: Theory and Algorithms

Accuracy Verification Methods: Theory and Algorithms

Barnes and Noble
Handbook of Computer Aided Verification

Handbook of Computer Aided Verification

Barnes and Noble
Secure System Design and Trustable Computing

Secure System Design and Trustable Computing

Barnes and Noble
Proofs and Computations

Proofs and Computations

Barnes and Noble
Current Trends in Hardware Verification and Automated Theorem Proving / Edition 1

Current Trends in Hardware Verification and Automated Theorem Proving / Edition 1

Barnes and Noble
Code's Cryptic Calculus: Unveiling cryptography's core concepts and practical applications, detailing techniques and methods

Code's Cryptic Calculus: Unveiling cryptography's core concepts and practical applications, detailing techniques and methods

Barnes and Noble
System-on-Chip Security: Validation and Verification

System-on-Chip Security: Validation and Verification

Barnes and Noble
Public-Key Cryptography - PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II

Public-Key Cryptography - PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II

Barnes and Noble
Foundations of Dependable Computing: System Implementation

Foundations of Dependable Computing: System Implementation

Barnes and Noble
Post-Silicon and Runtime Verification for Modern Processors

Post-Silicon and Runtime Verification for Modern Processors

Barnes and Noble
Computing with Social Trust

Computing with Social Trust

Barnes and Noble
Secure Edge Computing: Applications, Techniques and Challenges

Secure Edge Computing: Applications, Techniques and Challenges

Barnes and Noble
Cryptography and Computational Number Theory

Cryptography and Computational Number Theory

Barnes and Noble
Turing Computability: Theory and Applications

Turing Computability: Theory and Applications

Barnes and Noble
Security, Privacy and Reliability in Computer Communications and Networks

Security, Privacy and Reliability in Computer Communications and Networks

Barnes and Noble
Computer Security and Cryptography

Computer Security and Cryptography

Barnes and Noble
Powered by Adeptmind