Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
problem protection » problems protecting, problem prevention, problem detection
protection https » prevention https, pollution https, proteomics https
https function » its function, sites function, ups function
function java » function jane, function jason, function james
problem protection » problems protecting, problem prevention, problem detection
protection https » prevention https, pollution https, proteomics https
https function » its function, sites function, ups function
function java » function jane, function jason, function james
1
Published 2013
Table of Contents:
“...Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection -- Dynamic...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“...-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“...Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... and Countermeasures for ARIA -- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection...”View full text
Electronic
eBook
6
Published 2014
Table of Contents:
“.... Landscape ecology based approach for assessing pekarangan condition to preserve protected area in West Java...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... Systems -- Tools -- JML4: Towards an Industrial Grade IVE for Java and Next Generation Research Platform...”View full text
Electronic
eBook
8
Published 2007
Table of Contents:
“...Roadmapping and i-Systems -- Exploring Computational Scheme of Complex Problem Solving Based...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks...”View full text
Electronic
eBook
10
Published 2005
Table of Contents:
“... -- Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need...”View full text
Electronic
eBook



