Search alternatives:
function security » functions security, nutrition security, aviation security
problem adaptive » problems adaptive, from adaptive
adaptive https » adaptive help, adaptive hints, adaptive atlas
https function » its function, sites function, ups function
1
Published 2015
Table of Contents: ... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ... Encryption with Adaptive Security and Short Ciphertexts -- Session 1C. Security in Distributed and Mobile...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... Applications -- Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...
View full text
Electronic eBook
9
Published 2012
Table of Contents: ... To Oxidative Stress And Adaptive Response; S.G. Chankova, N. Yurina -- Flavonoid Biosynthesis Genes In Wheat...
View full text
Electronic eBook
10
Published 2012
Table of Contents: ... Revisited -- Reduction in Lossiness of RSA Trapdoor Permutation -- Adaptively Secure Efficient Lattice (H...
View full text
Electronic eBook
11
Published 2013
Table of Contents: ... with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... -- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification -- Security...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... Function -- Self-stabilizing Leader Election in Dynamic Networks -- Loop-Free Super-Stabilizing Spanning...
View full text
Electronic eBook
14
Published 2014
Table of Contents: ... Curves: The Achille's Heel of Fault Attack Countermeasures -- On Adaptive Bandwidth Selection...
View full text
Electronic eBook
15
Published 2012
Table of Contents: ... Optimization Algorithm for the Open Vehicle Routing Problem -- A Self-adaptive Heterogeneous PSO Inspired...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ...-Based Signature with Message Recovery -- Encryption and Key Agreement An Adaptively CCA-Secure...
View full text
Electronic eBook
17
Published 2007
Table of Contents: ... Inhibitors, P21, P27 And P53 -- Pulmonary Adaptation To High Altitude In Wild Mammals -- The Lung At High...
View full text
Electronic eBook
18
Published 2015
Table of Contents: ...-Preserving in Social Networks -- Securely Solving Classical Network Flow Problems -- Remote IP Protection...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... and Generalisation: Footprints in Instance Space -- Adaptive Drift Analysis -- Optimizing Monotone Functions Can...
View full text
Electronic eBook
20
Published 2014
Table of Contents: ... Sandwich Plates of Linearly Varying Thickness -- Solve Shortest Paths Problem by using Artificial Bee...
View full text
Electronic eBook