seminar computer science masters computer security biometrics recognition pattern recognition multimedia video image block cipher computer architecture 3d face ear facial fingerprint fingerprints forensic dental forensic dental hand geometry hand hand vascular vascular iris multi biometrics signature on line signature palm palm print voice graphics image compression standards compression video compression lossless compression lossless lossy compression lossy content based retrieval communications network networks mobile wireless watermarking steganography cryptanalysis method cryptanalysis email security email key management and distribution key key management digital signatures network security hash functions hash elliptic curve elgamal diffie hellman rsa public key cryptography public key prng pseudorandom number generation pseudorandom aes advanced encryption standard block cipher operation des pentium architecture pentium rtl register transfer languages multi core multi core processor hazards pipelining multi processor input output input output organization page replacement algorithms virtual memory memory system cache memory stack displacement register indirect register indirect direct immediate instruction set architecture isa type of address instruction pentium instruction format instruction formats microprogramed control hardwired control control unit
See more