1
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ... security -- Part II Preparation and Characterization Techniques -- 2. Laser-assisted growth and processing...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... of Designs -- The Application of an Object-Oriented Method in Information System Security Evaluation...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... Silica with Thiourea Functional Groups -- Application of Sol-Gel Method for Synthesis of a Biosensitive...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... Failure to Proof: The ProB Disprover for B and Event-B -- Formalizing a Secure Foreign Function Interface...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... Engineering -- Collaborative Context Prediction -- Ranking Cryptographic Algorithms -- Part III Methods...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... to Fill Up Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key...
View full text
Electronic eBook
9
Published 2013
Table of Contents: ...An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teaching...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Hash Functions -- Security Analysis of the Mode of JH Hash Function -- Enhanced Security Notions...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... Will This Case Finally Be Finished? -- XML Methods for Validation of Temporal Properties on Message Traces...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... Anvil Cell: Methods and Applications -- Reduction and Analysis of Two-Dimensional Diffraction Data...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Reconfigurable Function Model and Optimized Interface Topologies -- ReconOS: An Operating System for Dynamically...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... Dynamic Joint Protocols Selection Method to Perform Collaborative Tasks -- A Formal Framework...
View full text
Electronic eBook
16
Published 2012
Subjects: ...User Interfaces and Human Computer Interaction. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... Interfaces -- The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Technologies and Issues Relating to Privacy, Ethics and Security -- The Role of the User in the Design Process...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... Models of Epistasis -- Partial Orderings for Ranking Help Functions -- Robust Prediction with ANNBFIS...
View full text
Electronic eBook