1
Published 2007
Table of Contents: ... Investigation” in the Computer Environment: Legal Aspects -- Identity, Information Security and Rights...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
View full text
Electronic eBook
3
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
4
Published 2014
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ... Multidimensional Feature Vectors -- A Virtualized Architecture for Secure Database Management in Cloud Computing...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ...Solving the 0-1 Knapsack Problem Using Genetic Algorithm - Teaching Learning Based Optimization...
View full text
Electronic eBook
10
Published 2005
Table of Contents: ...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ...-Pass Two-Party Key Establishment Protocol -- Zero Knowledge and Secure Computation Protocols...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ... -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal...
View full text
Electronic eBook
15
Published 2012
Table of Contents: ...-Preserving Noisy Keyword Search in Cloud Computing -- Forward Secure Attribute-Based Signatures...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...
View full text
Electronic eBook
19
Published 2013
Table of Contents: ... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...
View full text
Electronic eBook