Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
Cerca anche:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problems based » problem based, problems cases
based https » based http
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problems based » problem based, problems cases
based https » based http
1
Pubblicazione 2007
Sommario:
“... -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement...”Testo
Elettronico
eBook
2
Pubblicazione 2008
Sommario:
“... Standard -- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less...”Testo
Elettronico
eBook
3
Pubblicazione 2006
Sommario:
“...Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention...”Testo
Elettronico
eBook
4
di Boon, Chian Tea, Kamel Ariffin, Muhammad Rezal, Abd Ghafar, Amir Hamzah, Sapar, Siti Hasana, Mohamat Johari, Mohamat Aidil
Pubblicazione 2022
“..., in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP...”Pubblicazione 2022
Articolo
5
Pubblicazione 2007
Sommario:
“... Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel...”Testo
Elettronico
eBook
6
Pubblicazione 2010
Sommario:
“... for Game-Based Security Proofs -- Automating Computational Proofs for Public-Key-Based Key Exchange...”Testo
Elettronico
eBook
7
Pubblicazione 2013
Soggetti:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”Testo
Elettronico
eBook
8
Pubblicazione 2008
Sommario:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”Testo
Elettronico
eBook
9
Pubblicazione 2007
Sommario:
“... -- Fuzzy Identities and Attribute-Based Encryption -- Unconditionally Secure Multiparty Computation from...”Testo
Elettronico
eBook
10
Pubblicazione 2015
Sommario:
“... Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption...”Testo
Elettronico
eBook
11
Pubblicazione 2005
Sommario:
“... Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two...”Testo
Elettronico
eBook
12
Pubblicazione 2010
Sommario:
“...-Based Cryptography -- Recursive Lattice Reduction -- Adaptively Secure Identity-Based Identification...”Testo
Elettronico
eBook
13
Pubblicazione 2006
Sommario:
“...Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems...”Testo
Elettronico
eBook
14
Pubblicazione 2008
Sommario:
“... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...”Testo
Elettronico
eBook
15
Pubblicazione 2008
Sommario:
“... as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact...”Testo
Elettronico
eBook
16
Pubblicazione 2008
Sommario:
“... Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application...”Testo
Elettronico
eBook
17
Pubblicazione 2005
Sommario:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”Testo
Elettronico
eBook
18
Pubblicazione 2005
Sommario:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”Testo
Elettronico
eBook
19
Pubblicazione 2007
Sommario:
“... Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs...”Testo
Elettronico
eBook
20
Pubblicazione 2006
Sommario:
“... -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving...”Testo
Elettronico
eBook



