Conference paper
Modeling polarization for Hyper-NA lithography tools and masks
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
For high integrity cryptographic systems, the control mechanisms are already available as exemplified by the IBM symmetric and asymmetric control vector approaches. These have been designed for effective extension. Such mechanisms are always inevitably in conflict with existing standards which have not sought to define control over key usage. It would be of considerable value to the community as a whole if a consolidated and effective mechanism were to be standardized in the future. © 1995.
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
Charles H. Bennett, Aram W. Harrow, et al.
IEEE Trans. Inf. Theory
Alessandro Morari, Roberto Gioiosa, et al.
IPDPS 2011
Gal Badishi, Idit Keidar, et al.
IEEE TDSC