Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
visualization https » globalization https
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Published 2008
Table of Contents: ... for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
3
Published 2012
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
10
Table of Contents: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking and Remoting -- Security...
View full text
Electronic eBook
11
Published 2012
Table of Contents: ... Infrastructure via Enhanced SIEM Technology -- On Securing Communications among Federated Health Information...
View full text
Electronic eBook
12
Published 2013
Table of Contents: ... Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation...
View full text
Electronic eBook
13
Published 2013
Table of Contents: ...: Long live security-aware principal agents -- Information Security as a Credence Good -- Sorry, I Don't...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... Rehabilitation Process; S.Salim, et al -- A Security Protocol based-on Mutual Authentication Application toward...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... -- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM -- Wavelet Transform in Face...
View full text
Electronic eBook
17
Published 2011
Table of Contents: ... Analyzing -- Research on Audio-Visual Asynchronous Correlation for Speaker Identification Based on DBN...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... to Relevance -- Brain-Like Evolving Spiking Neural Networks for Multimodal Information Processing -- Human-Like...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... Templates for Information Systems: Foundations and Perspectives -- Reduction Based Symbolic Value Partition...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... -- Service Discovery in the SOA System -- An Information Theoretic Web Site Navigability Classification...
View full text
Electronic eBook