Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
visualization https » globalization https
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
visualization https » globalization https
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Published 2008
Table of Contents:
“... for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... Authentication -- On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook
10
Table of Contents:
“... -- Graphics, Multimedia, and Printing -- Database Access -- Networking and Remoting -- Security...”
View full text
View full text
Electronic
eBook
11
Published 2012
Table of Contents:
“... Infrastructure via Enhanced SIEM Technology -- On Securing Communications among Federated Health Information...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“... Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation...”View full text
Electronic
eBook
13
Published 2013
Table of Contents:
“...: Long live security-aware principal agents -- Information Security as a Credence Good -- Sorry, I Don't...”View full text
Electronic
eBook
14
Published 2012
Table of Contents:
“... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“... Rehabilitation Process; S.Salim, et al -- A Security Protocol based-on Mutual Authentication Application toward...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... -- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM -- Wavelet Transform in Face...”View full text
Electronic
eBook
17
Published 2011
Table of Contents:
“... Analyzing -- Research on Audio-Visual Asynchronous Correlation for Speaker Identification Based on DBN...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... to Relevance -- Brain-Like Evolving Spiking Neural Networks for Multimodal Information Processing -- Human-Like...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... Templates for Information Systems: Foundations and Perspectives -- Reduction Based Symbolic Value Partition...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... -- Service Discovery in the SOA System -- An Information Theoretic Web Site Navigability Classification...”View full text
Electronic
eBook



