Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
processing functionality » processing functional, protein functionality, properties functionality
functionality securing » functionality setting, functionality using, functionality testing
computer processing » computer programming
problems computer » problems computing, problems chapter, programs computer
securing https » security https, security http, securing rtp
processing functionality » processing functional, protein functionality, properties functionality
functionality securing » functionality setting, functionality using, functionality testing
computer processing » computer programming
problems computer » problems computing, problems chapter, programs computer
securing https » security https, security http, securing rtp
1
Published 2007
Table of Contents:
“... Investigation” in the Computer Environment: Legal Aspects -- Identity, Information Security and Rights...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”View full text
Electronic
eBook
3
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“... Multidimensional Feature Vectors -- A Virtualized Architecture for Secure Database Management in Cloud Computing...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“...Solving the 0-1 Knapsack Problem Using Genetic Algorithm - Teaching Learning Based Optimization...”View full text
Electronic
eBook
10
Published 2005
Table of Contents:
“...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”View full text
Electronic
eBook
13
Published 2014
Table of Contents:
“... -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“...-Preserving Noisy Keyword Search in Cloud Computing -- Forward Secure Attribute-Based Signatures...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks...”View full text
Electronic
eBook
17
Published 2006
Table of Contents:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...”View full text
Electronic
eBook
19
Published 2013
Table of Contents:
“... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook



