Comparing low and medium cost computer-based technologies suitable for cryptographic attacks

Logic Journal of the IGPL (forthcoming)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 90,593

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

A Philosophy of Computer Art.Dominic Lopes - 2009 - New York: Routledge.
Serious games e simulazione come risorse per l’educazione.Luca Mori - 2012 - Meta: Research in Hermeneutics, Phenomenology, and Practical Philosophy 4 (1):56-72.
Maximizing Local Effect of HIV Prevention Resources.Shin-Yi Wu, Deborah Cohen, Lu Shi & Thomas Farley - 2005 - Contagion: Journal of Violence, Mimesis, and Culture 2 (3):127-132.
Diagnosis without doctors.James G. Mazoué - 1990 - Journal of Medicine and Philosophy 15 (6):559-579.
The Biopolitics of Technoculture in the Mumbai Attacks.Caren Kaplan - 2009 - Theory, Culture and Society 26 (7-8):301-313.

Analytics

Added to PP
2018-09-18

Downloads
5 (#1,344,154)

6 months
2 (#668,348)

Historical graph of downloads
How can I increase my downloads?

Author Profiles

Vladimir Martínez
Pontificia Universidad Católica del Ecuador
Arturo Munoz
Rice University

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references