Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problem computing » problems computing
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problem computing » problems computing
1
Published 2005
Table of Contents:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”View full text
Electronic
eBook
2
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... for Privacy Preserving Distributed Computations -- Generic Construction of GUC Secure Commitment in the KRK...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... with Jumps -- Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem -- Improving the cAnt...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... Multi-disciplinary and Multi-sectoral Perspective -- Problem Frames and Architectures for Security...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... for Game-Based Security Proofs -- Automating Computational Proofs for Public-Key-Based Key Exchange...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“...Trusted Computing -- Property-Based TPM Virtualization -- A Demonstrative Ad Hoc Attestation System...”View full text
Electronic
eBook
13
Published 2006
Table of Contents:
“...Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... Adaptive OT under the DDH Assumption -- Improved Primitives for Secure Multiparty Integer Computation...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“...Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“... -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security...”View full text
Electronic
eBook



