1
Published 2012
Table of Contents: ...; A.V. Rubanovich et al -- Radioecology Of The Future: The Problem Of Final Geological Disposal...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... Weighting Methods -- Controlled Physical Random Functions -- Experimental Hardware for Coating PUFs...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Secure Protocols and Open Problems (Invited Talk) -- Almost Secure 1-Round Message Transmission Scheme...
View full text
Electronic eBook
7
Published 2005
Table of Contents: ...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Programs -- The Case for Nuclear Energy -- Nuclear Safety and Energy Security -- Nuclear Energy and Social...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... Causes of Implementation Problems and Proven Ways to Overcome them -- A Security Architecture...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... Study with the HC Series of Stream Ciphers -- Performance and Security Evaluation of AES S-Box-Based...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ...-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm -- Hash Functions – II -- Analysis...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ... with Jumps -- Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem -- Improving the cAnt...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... of the DES -- Robust Key Extraction from Physical Uncloneable Functions -- Efficient Constructions for One...
View full text
Electronic eBook
16
Published 2013
Table of Contents: ... Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... Cryptography: Physical Unclonable Functions -- Regular Papers -- Low-Cost Elliptic Curve Cryptography...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ...Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ... and Forecasting Regional Atmospheric Processes -- Numerical Forecast of Air Pollution — Advances and Problems...
View full text
Electronic eBook
20
Published 2006
Table of Contents: ... Approximation of S-box Functions -- Random Generation of S-Boxes for Block Ciphers -- Problems of Sending...
View full text
Electronic eBook