Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
function generalized » functions generalized, functional generalized, functionals generalized
https functionality » its functionality, bags functionality, cross functionality
generalized https » generalized hyers, generalized atoms, generalized hat
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
function generalized » functions generalized, functional generalized, functionals generalized
https functionality » its functionality, bags functionality, cross functionality
generalized https » generalized hyers, generalized atoms, generalized hat
securing https » security https, security http, securing rtp
1
Table of Contents:
“...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...”
View full text
View full text
Electronic
eBook
2
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
3
Subjects:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”
View full text
View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... and Application of UV Excimer Lamps in Nanofabrication -- Functionalization of Semiconductor Nanoparticles...”View full text
Electronic
eBook
5
by Hajek, Petr., Hajek, Petr., Montesinos Santalucia, Vicente., Vanderwerff, Jon., Zizler, Vaclav.
Published 2008
Subjects:
“...Functional Analysis. https://scigraph.springernature.com/ontologies/product-market-codes/M12066...”Published 2008
View full text
Electronic
eBook
6
Published 2013
Table of Contents:
“... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...”View full text
Electronic
eBook
7
Published 2015
Table of Contents:
“..., Philanthropy, and Human Security: Concepts, and Contexts- Samiul Hasan -- Chapter 2: Human Security in A...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... Scheme and Its Secure Version -- Application of Hash Functions -- Leaky Random Oracle (Extended Abstract...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“... for Sustainable Food Security and Eco-System -- 36. PCR Amplification, Sequencing and Insilico Characterization...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“... and Environmental Security: The Dietary Grape Polyphenol Concentrate Enoant as Functional Food in Prevention...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... in Lattice-Based Cryptography -- Cryptanalysis -- Differential Fault Analysis of LEX -- Generalized RC4 Key...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“...1. Introduction: The Food Security Problem in Australia -- Part I. Food Equity and Access -- 2...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... Break Ends; M.A. Resnick -- Facultativeness Principle And Generalized Approach To The Genome...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“...) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment...”View full text
Electronic
eBook



