Search Results - "Computer security."
-
81
-
82
-
83
-
84
-
85
Domain specific high-level synthesis for cryptographic workloads
Published 2019Available for University of the Philippines Diliman via SpringerLink. Click here to access
Also available remotely for University of the Philippines Diliman via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
86
The next era in hardware security a perspective on emerging technologies for secure electronic
Published 2021Get full text
Get full text
Electronic Resource -
87
Security and privacy of electronic healthcare records concepts, paradigms and solutions
Published 2019Available for University of the Philippines Diliman via IET Digital Library. Click here to access
Also available remotely for University of the Philippines Diliman via IET Digital Library. Click here to access thru EZproxy
Electronic Resource -
88
Chinese hackers gain access to designs of US weapons. IN News.
Published in The Philippine StarArticle -
89
-
90
Trust extension as a mechanism for secure code execution on commodity computers
Published 2014Available for University of the Philippines Diliman via ACM Digital Library. Click here to access
Also available remotely for University of the Philippines Diliman via ACM Digital Library. Click here to access thru EZproxy
Electronic Resource


