Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
problem evaluating » problems evaluation
evaluating https » evaluation https, evaluating hot, evaluation http
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
problem evaluating » problems evaluation
evaluating https » evaluation https, evaluating hot, evaluation http
securing https » security https, security http, securing rtp
1
Published 2008
Table of Contents:
“... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... Authentication -- On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... for Two-Party Secure Function Evaluation -- Information Hiding and Tracing -- Upper Bounds for Set Systems...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“...Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... Protocol for Dynamic Groups -- A Practical Universal Circuit Construction and Secure Evaluation of Private...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...”View full text
Electronic
eBook
11
Published 2012
Table of Contents:
“... Study with the HC Series of Stream Ciphers -- Performance and Security Evaluation of AES S-Box-Based...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“... -- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification -- Security...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... Causes of Implementation Problems and Proven Ways to Overcome them -- A Security Architecture...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... Modification of KASUMI Type Permutations -- Provably Secure Double-Block-Length Hash Functions in a Black-Box...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“... with Jumps -- Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem -- Improving the cAnt...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... of Designs -- The Application of an Object-Oriented Method in Information System Security Evaluation...”View full text
Electronic
eBook
18
Published 2013
Table of Contents:
“...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“... Control of Blast Disease of Rice in Southwest Nigeria -- 21. Evaluation of Biotic and Abiotic Factors...”View full text
Electronic
eBook



