Aihe-ehdotuksia
Aihe-ehdotuksia
Tarkoititko:
security functionality » security functional, obesity functionality, security functions
parallel protocols » parallel tools, parallel process, parallel projections
protocols security » protocol security, protocols secure
functionality java » functionality maps, functionality iv, functionality part
https » http
security functionality » security functional, obesity functionality, security functions
parallel protocols » parallel tools, parallel process, parallel projections
protocols security » protocol security, protocols secure
functionality java » functionality maps, functionality iv, functionality part
https » http
1
Julkaistu 2008
Sisällysluettelo:
“... Parametric Behaviour Models -- Extra-Functional Properties: Security and Energy -- Validating Access Control...”Hae kokoteksti
Elektroninen
E-kirja
2
Julkaistu 2006
Sisällysluettelo:
“... -- The Robustness of Resource Allocations in Parallel and Distributed Computing Systems -- Pervasive Computing...”Hae kokoteksti
Elektroninen
E-kirja
3
Julkaistu 2005
Sisällysluettelo:
“...) -- Letter Based Text Scoring Method for Language Identification -- Parallel and Distributed Data Processing...”Hae kokoteksti
Elektroninen
E-kirja
4
Julkaistu 2010
Sisällysluettelo:
“... of the Internet Protocol Security and Its Impact on Interactive Communications -- Investigating Software...”Hae kokoteksti
Elektroninen
E-kirja
5
Julkaistu 2005
Sisällysluettelo:
“... Cut-Through Medium Access) Protocol for 802.11-Based Multi-hop Wireless Networks -- Some Security...”Hae kokoteksti
Elektroninen
E-kirja
6
Julkaistu 2013
Sisällysluettelo:
“...An Evolutionary Framework for Routing Protocol Analysis in Wireless Sensor Networks -- Routing Low...”Hae kokoteksti
Elektroninen
E-kirja
7
Julkaistu 2007
Sisällysluettelo:
“... -- Application of Safety Analyses in Model Driven Development -- Mission Modes for Safety Critical Java -- Safety...”Hae kokoteksti
Elektroninen
E-kirja
8
Julkaistu 2014
Sisällysluettelo:
“... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...”Hae kokoteksti
Elektroninen
E-kirja



