Search alternatives:
problem security » problems security, provable security, problems securing
https function » its function, sites function, ups function
function java » function jane, function jason, function james
1
Published 2008
Table of Contents: ... -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems...
View full text
Electronic eBook
4
Published 2014
Table of Contents: ... -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem...
View full text
Electronic eBook
5
Published 2014
Table of Contents: ...Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Problem -- A Development of Data-Logger for Indoor Environment -- Multiobjective Evolutionary Optimization...
View full text
Electronic eBook
7
Published 2013
Table of Contents: ... Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ...Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ... -- Progress (and Lack Thereof) for Graph Coloring Approximation Problems -- Recent Results in Scalable Multi...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative...
View full text
Electronic eBook
12
Published 2013
Table of Contents: ... -- Generating Artificial Neural Networks for Value Function Approximation in a Domain Requiring a Shifting...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode...
View full text
Electronic eBook
14
Published 2015
Table of Contents: ...A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... Challenge -- A Structured Set of Higher-Order Problems -- Formal Modeling of a Slicing Algorithm for Java...
View full text
Electronic eBook
16
Published 2011
Table of Contents: ...From the content: Patterns improving the Common Criteria compliant IT security development process...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... Procedures -- Session 2: Specific Theories -- Proving Bounds on Real-Valued Functions with Computations...
View full text
Electronic eBook
18
Published 2008
Table of Contents: ... Foundation for Security -- Combining Domain-Specific and Foundational Logics to Verify Complete Software...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... of Novel Stochastic Methods of Function Recovery -- Automatic Face Analysis System Based on Face...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... for Solving Very Large Scale Instances of the Design Distribution Problem for Distributed Database Systems...
View full text
Electronic eBook