Malleability

Results: 104



#Item
1SPATIAL TRAINING META-ANALYSIS  The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

SPATIAL TRAINING META-ANALYSIS The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

Add to Reading List

Source URL: silccenter.org

- Date: 2012-04-04 14:48:02
    2SPATIAL TRAINING META-ANALYSIS  The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

    SPATIAL TRAINING META-ANALYSIS The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

    Add to Reading List

    Source URL: spatialintelligence.org

    - Date: 2012-04-04 14:48:02
      3Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

      Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2003-08-29 18:48:12
      4Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden   Abstract. Consider an electronic election scheme implemented using a

      Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

      Add to Reading List

      Source URL: www.nada.kth.se

      Language: English - Date: 2012-05-30 08:51:39
      5A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

      A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

      Add to Reading List

      Source URL: cs-www.cs.yale.edu

      Language: English - Date: 2001-10-24 10:54:04
      6Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

      Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2006-01-05 12:45:55
      7A Note on the Malleability of the El Gamal Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

      A Note on the Malleability of the El Gamal Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

      Add to Reading List

      Source URL: www.nada.kth.se

      Language: English - Date: 2012-05-30 08:38:02
      8The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

      The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2003-08-29 18:48:22
      9SPATIAL TRAINING META-ANALYSIS  The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

      SPATIAL TRAINING META-ANALYSIS The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

      Add to Reading List

      Source URL: www.silccenter.org

      Language: English - Date: 2012-04-04 14:48:02
      10Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1  University of Illinois at Urbana-Champaign

      Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

      Add to Reading List

      Source URL: web.engr.illinois.edu

      Language: English - Date: 2014-08-27 22:14:05