computer masters computer science seminar security biometrics recognition pattern recognition multimedia video computer architecture block cipher image pentium architecture pentium rtl register transfer languages multi core multi core processor des block cipher operation advanced encryption standard aes pseudorandom pseudorandom number generation prng public key public key cryptography rsa diffie hellman elgamal control unit hardwired control microprogramed control instruction formats pentium instruction format type of address instruction instruction set architecture isa immediate direct indirect register register indirect displacement stack cache memory memory system virtual memory page replacement algorithms input output organization input output multi processor pipelining lossless compression video compression compression image compression standards graphics voice palm print palm on line signature signature multi biometrics iris vascular hand vascular hand hand geometry forensic dental dental forensic fingerprints fingerprint facial ear 3d face hazards elliptic curve hash hash functions network security digital signatures key management key key management and distribution email email security cryptanalysis cryptanalysis method steganography watermarking wireless mobile networks network communications content based retrieval lossy lossy compression lossless
See more