Results 11 to 20 of about 392 (71)

Abstract Book: 25th Congress of the European Hematology Association Virtual Edition, 2020

open access: yes, 2020
HemaSphere, Volume 4, Issue S1, Page 1-1168, June 2020.
wiley   +1 more source

THESSALY UNDER THE SERBS (1348 - c. 1373) [PDF]

open access: yes, 2022
Η κυριαρχία των Σέρβων στη Θεσσαλία ξεκίνησε το 1348, όταν οι στρατιωτικές μονάδες του Σέρβου αυτοκράτορα Στέφανου Ντούσαν, με επικεφαλής τον εξέχοντα στρατηγό του Θωμά Β' Πρελιούμποβιτς, την κατέλαβαν και την ενσωμάτωσαν στη Σερβική Αυτοκρατορία.
Nikolić, Maja
core   +1 more source

Jön az Üstökös! [PDF]

open access: yes, 2022
A könyv sorra veszi a magyar nyelvterületen észlelt és feljegyzett üstökösöket, illetve Erdély esetében a német, román, török vagy akár latin nyelvű forrásokat is, és először írja össze ezeket, gazdagon illusztrálva korabeli képekkel.
Miholcsa, Gyula
core   +1 more source

Security is an Architectural Design Constraint [PDF]

open access: yes, 2019
In state-of-the-art design paradigm, time, space and power efficiency are considered the primary design constraints. Quite often, this approach adversely impacts the security of the overall system, especially when security is adopted as a countermeasure ...
Anupam Chattopadhyay   +5 more
core  

A Myth as a Replacement for a History: Ethnogenetic Elements in De Administrando Imperio and the Chronicle of the Priest of Duklja [PDF]

open access: yes, 2023
We will examine how the diversity of historical sources affects the portrayal of the Balkan Slavs by following two writings that notably differ. First is De Аdministrando Imperio, written in the X century. Our second source is the Chronicle of the Priest
Nurkić, Petar, Samčević, Vuk
core  

CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM [PDF]

open access: yes, 2020
Rapid advances in quantum computing, together with the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digital-signature, encryption, and key-establishment protocols, have created significant interest
Damien Stehlé   +8 more
core  

Notes on Lattice-Based Cryptography [PDF]

open access: yes, 2022
Asymmetrisk kryptering er avhengig av antakelsen om at noen beregningsproblemer er vanskelige å løse. I 1994 viste Peter Shor at de to mest brukte beregningsproblemene, nemlig det diskrete logaritmeproblemet og primtallsfaktorisering, ikke lenger er ...
Budroni, Alessandro
core  

Meter in Catullan invective: expectations and innovation [PDF]

open access: yes, 2016
This dissertation examines the place of Catullus' poetry in the iambic tradition and its innovation within that tradition. By the Classical period, the genre iambos had been distilled down to invective content in iambic meters, despite the much greater ...
Wheeler, Michael Ian Hulin
core   +1 more source

UEG Week 2017 Poster Presentations

open access: yes, 2017
United European Gastroenterology Journal, Volume 5, Issue S5, Page A161-A836, October 2017.
wiley   +1 more source

Home - About - Disclaimer - Privacy