Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
interface method » interface methods, interphase method, interval method
securing https » security https, security http, securing rtp
method https » methods https
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
interface method » interface methods, interphase method, interval method
securing https » security https, security http, securing rtp
method https » methods https
1
Published 2006
Table of Contents:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”View full text
Electronic
eBook
2
Published 2015
Table of Contents:
“... security -- Part II Preparation and Characterization Techniques -- 2. Laser-assisted growth and processing...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... of Designs -- The Application of an Object-Oriented Method in Information System Security Evaluation...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... Silica with Thiourea Functional Groups -- Application of Sol-Gel Method for Synthesis of a Biosensitive...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... Failure to Proof: The ProB Disprover for B and Event-B -- Formalizing a Secure Foreign Function Interface...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... Engineering -- Collaborative Context Prediction -- Ranking Cryptographic Algorithms -- Part III Methods...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... to Fill Up Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key...”View full text
Electronic
eBook
9
Published 2013
Table of Contents:
“...An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teaching...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Hash Functions -- Security Analysis of the Mode of JH Hash Function -- Enhanced Security Notions...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... Will This Case Finally Be Finished? -- XML Methods for Validation of Temporal Properties on Message Traces...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... Anvil Cell: Methods and Applications -- Reduction and Analysis of Two-Dimensional Diffraction Data...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Reconfigurable Function Model and Optimized Interface Topologies -- ReconOS: An Operating System for Dynamically...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... Dynamic Joint Protocols Selection Method to Perform Collaborative Tasks -- A Formal Framework...”View full text
Electronic
eBook
16
Published 2012
Subjects:
“...User Interfaces and Human Computer Interaction. https://scigraph.springernature.com/ontologies...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... Interfaces -- The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System...”View full text
Electronic
eBook
18
Published 2005
Table of Contents:
“... Security and an Application to File System Accesses -- Regular Papers -- A Machine Text-Inspired Machine...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... Technologies and Issues Relating to Privacy, Ethics and Security -- The Role of the User in the Design Process...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... Models of Epistasis -- Partial Orderings for Ranking Help Functions -- Robust Prediction with ANNBFIS...”View full text
Electronic
eBook



