Crypto and Security-lup-obsolete
51 – 60 of 69
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2010
-
Mark
A Vector-based, Multidimensional Scanpath Similarity Measure
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Laboratory instructions as a cause of student dissonance
2010) LTHs 6:e Pedagogiska Inspirationskonferens, 2010(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sampling frequency and eye-tracking measures : how speed affects durations, latencies, and more
(
- Contribution to journal › Article
-
Mark
Security Evaluation of Stream Cipher Enocoro-128v2
2010)(
- Book/Report › Report
-
Mark
Learning perceptual aspects of diagnosis in medicine via eye movement modeling examples on patient video cases
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Automated algebraic cryptanalysis
2010) Tools for Cryptanalysis 2010 In Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010 p.11-11(
- Contribution to journal › Published meeting abstract
-
Mark
What speed do I need? Sampling frequency and dependent variables
2010) Scandinavian Workshop on Applied Eye-Tracking, 2010(
- Contribution to conference › Abstract
-
Mark
Fostering Perceptual Skills in Medical Diagnosis
2010) Meeting of the EARLI SIG6/7 Instructional Design and Learning and Instruction with Computers(
- Contribution to conference › Paper, not in proceeding
-
Mark
Using Coding Techniques to Analyze Weak Feedback Polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An adaptive algorithm for fixation, saccade, and glissade detection in eyetracking data.
(
- Contribution to journal › Article