Cerca anche:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problems based » problem based, problems cases
based https » based http
1
Pubblicazione 2007
Sommario: ... -- Identity-Based Proxy Re-encryption Without Random Oracles -- Strongly-Secure Identity-Based Key Agreement...
Testo
Elettronico eBook
2
Pubblicazione 2008
Sommario: ... Standard -- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less...
Testo
Elettronico eBook
3
Pubblicazione 2006
Sommario: ...Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention...
Testo
Elettronico eBook
4
..., in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP...
Articolo
5
Pubblicazione 2007
Sommario: ... Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel...
Testo
Elettronico eBook
6
Pubblicazione 2010
Sommario: ... for Game-Based Security Proofs -- Automating Computational Proofs for Public-Key-Based Key Exchange...
Testo
Elettronico eBook
7
Pubblicazione 2013
Soggetti: ...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...
Testo
Elettronico eBook
8
Pubblicazione 2008
Sommario: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
Testo
Elettronico eBook
9
Pubblicazione 2007
Sommario: ... -- Fuzzy Identities and Attribute-Based Encryption -- Unconditionally Secure Multiparty Computation from...
Testo
Elettronico eBook
10
Pubblicazione 2015
Sommario: ... Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption...
Testo
Elettronico eBook
11
Pubblicazione 2005
Sommario: ... Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange -- Signcryption -- Two...
Testo
Elettronico eBook
12
Pubblicazione 2010
Sommario: ...-Based Cryptography -- Recursive Lattice Reduction -- Adaptively Secure Identity-Based Identification...
Testo
Elettronico eBook
13
Pubblicazione 2006
Sommario: ...Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems...
Testo
Elettronico eBook
14
Pubblicazione 2008
Sommario: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
Testo
Elettronico eBook
15
Pubblicazione 2008
Sommario: ... as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact...
Testo
Elettronico eBook
16
Pubblicazione 2008
Sommario: ... Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application...
Testo
Elettronico eBook
17
Pubblicazione 2005
Sommario: ... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...
Testo
Elettronico eBook
18
Pubblicazione 2005
Sommario: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
Testo
Elettronico eBook
19
Pubblicazione 2007
Sommario: ... Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs...
Testo
Elettronico eBook
20
Pubblicazione 2006
Sommario: ... -- A Robust and Secure RFID-Based Pedigree System (Short Paper) -- A Topological Condition for Solving...
Testo
Elettronico eBook