1
Published 2013
Table of Contents: ...Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection -- Dynamic...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ...-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ...Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... and Countermeasures for ARIA -- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection...
View full text
Electronic eBook
6
Published 2014
Table of Contents: .... Landscape ecology based approach for assessing pekarangan condition to preserve protected area in West Java...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... Systems -- Tools -- JML4: Towards an Industrial Grade IVE for Java and Next Generation Research Platform...
View full text
Electronic eBook
8
Published 2007
Table of Contents: ...Roadmapping and i-Systems -- Exploring Computational Scheme of Complex Problem Solving Based...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ... Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks...
View full text
Electronic eBook
10
Published 2005
Table of Contents: ... -- Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need...
View full text
Electronic eBook