Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problem computing » problems computing
1
Published 2005
Table of Contents: ... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...
View full text
Electronic eBook
2
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... for Privacy Preserving Distributed Computations -- Generic Construction of GUC Secure Commitment in the KRK...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... with Jumps -- Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem -- Improving the cAnt...
View full text
Electronic eBook
6
Published 2015
Table of Contents: ... Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... Multi-disciplinary and Multi-sectoral Perspective -- Problem Frames and Architectures for Security...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... for Game-Based Security Proofs -- Automating Computational Proofs for Public-Key-Based Key Exchange...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ...Trusted Computing -- Property-Based TPM Virtualization -- A Demonstrative Ad Hoc Attestation System...
View full text
Electronic eBook
13
Published 2006
Table of Contents: ...Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ...Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems...
View full text
Electronic eBook
19
Published 2008
Table of Contents: ... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security...
View full text
Electronic eBook