Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Michail, Harris"'
Autor:
Michail, Harris E., Athanasiou, George S., Theodoridis, George, Gregoriades, Andreas, Goutis, Costas E.
Publikováno v:
In Microprocessors and Microsystems September 2016 45 Part B:227-240
Publikováno v:
Advances in Human Aspects of Transportation: Part III.
Smart driver assistive technologies (DAT) have been developed to alleviate accident risk by either reducing driver workload or assessing driver attentiveness. Such systems aim to draw drivers’ attention on critical cues that improve their decision
Autor:
Michail, Harris, Gregoriades, Andreas, Dimitriou, Loukas, Pampaka, Maria, Georgiades, Michael
Pedestrian tourists are considered the most vulnerable road users of urban mobility environments. Tourists are a special category of pedestrians, exhibiting different visual behaviour to residents due to their enthusiasm and unfamiliarity with the en
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::9279c9268e3553d29ecf0c584b1ec4f4
https://hdl.handle.net/20.500.14279/28998
https://hdl.handle.net/20.500.14279/28998
Publikováno v:
In Integration, the VLSI Journal 2009 42(2):217-226
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Goutis, Costas E., Michail, Harris, Athanasiou, George S., Theodoridis, George, Gregoriades, Andreas
Hash functions are among the major blocks of modern security schemes, used in many applications to provide authentication services. To meet the applications' real-time constraints, they are implemented in hardware offering high-performance and increa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::3e65bab8004e5a06a0bf5b189626f0c1
https://api.elsevier.com/content/abstract/scopus_id/84867638119
https://api.elsevier.com/content/abstract/scopus_id/84867638119
Autor:
Athanasiou, George S., Theodoridis, George, Chalkou, Chara I., Goutis, Costas E., Michail, Harris, Bardis, D.
Hash functions are exploited by many cryptographic primitives that are incorporated in crucial cryptographic schemes and commercial security protocols. Nowadays, there is an active international competition, launched by the National Institute of Stan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::1a140f2e029b01896e660c4815b32f1d
https://api.elsevier.com/content/abstract/scopus_id/84867636718
https://api.elsevier.com/content/abstract/scopus_id/84867636718
Cryptography can be considered as a special application of coding schemes. High speed execution of Encoding and Decoding processes is crucial in the majority of the so-called security schemes. In fact, the characteristics of a cryptographic algorithm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::17796b82d8c88733d4ae04becd694407
https://api.elsevier.com/content/abstract/scopus_id/84892035222
https://api.elsevier.com/content/abstract/scopus_id/84892035222
The work described here draws on the emerging need to internationalize the curriculum in higher education. The focus of the study is on the evaluation of a Management Information Systems (MIS) Module, and the specification of appropriate course of ac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::1e1ec7d34f8201191bcd3cd4c16f0e78
https://hdl.handle.net/20.500.14279/18406
https://hdl.handle.net/20.500.14279/18406
HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::a1c51e6715c06e935bbb8b9ede2583a1
https://hdl.handle.net/20.500.14279/1505
https://hdl.handle.net/20.500.14279/1505