Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
security functionality » security functional, obesity functionality, security functions
functionality using » functionality business, functionality design, functioning using
parallel function » parallel functional, parallel auction, parallel union
function security » functions security, nutrition security, aviation security
using https » using http, nursing https, aging https
security functionality » security functional, obesity functionality, security functions
functionality using » functionality business, functionality design, functioning using
parallel function » parallel functional, parallel auction, parallel union
function security » functions security, nutrition security, aviation security
using https » using http, nursing https, aging https
1
Table of Contents:
“...Introduction -- Use Cases -- The Basic Applications -- Testing and Specification of PUFs -- Error...”
View full text
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Grove and Its Distributed Performance -- A Massively Parallel Hardware for Modular Exponentiations Using...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... -- Specifying Authentication Using Signal Events in CSP -- Modeling RFID Security -- Systems Security...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...”View full text
Electronic
eBook
11
Published 2006
Table of Contents:
“... for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...”View full text
Electronic
eBook
13
Published 2012
Table of Contents:
“... and Value Faults -- An Approach Supporting Fault-Propagation Analysis for Smart Sensor Systems -- Use...”View full text
Electronic
eBook
14
Published 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“... of Authentication Using Brainwaves -- Usability and Security of Gaze-Based Graphical Grid Passwords -- The impact...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm -- Spatio-temporal Facial...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... -- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM -- Wavelet Transform in Face...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook



