Abstract: Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security.
Cache conscious hash map and hash set for strings based on the "Cache-conscious collision resolution in string hash tables." (Askitis Nikolas and Justin Zobel, 2005) paper. You can find some details ...
Abstract: Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs ...
Iwi Māori Partnership Boards (IMPBs) are concerned their role in the health system will be reduced under the government's Healthy Futures (Pae Ora) Amendment Bill. The Health Select Committee released ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results