1
Table of Contents: ...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...
View full text
Electronic eBook
2
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
3
Subjects: ...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... and Application of UV Excimer Lamps in Nanofabrication -- Functionalization of Semiconductor Nanoparticles...
View full text
Electronic eBook
5
Subjects: ...Functional Analysis. https://scigraph.springernature.com/ontologies/product-market-codes/M12066...
View full text
Electronic eBook
6
Published 2013
Table of Contents: ... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...
View full text
Electronic eBook
7
Published 2015
Table of Contents: ..., Philanthropy, and Human Security: Concepts, and Contexts- Samiul Hasan -- Chapter 2: Human Security in A...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... for Sustainable Food Security and Eco-System -- 36. PCR Amplification, Sequencing and Insilico Characterization...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... and Environmental Security: The Dietary Grape Polyphenol Concentrate Enoant as Functional Food in Prevention...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...
View full text
Electronic eBook
15
Published 2013
Table of Contents: ...1. Introduction: The Food Security Problem in Australia -- Part I. Food Equity and Access -- 2...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... Break Ends; M.A. Resnick -- Facultativeness Principle And Generalized Approach To The Genome...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ...) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment...
View full text
Electronic eBook