Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
physical https » physics https, physics http, physical attacks
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
physical https » physics https, physics http, physical attacks
1
Published 2012
Table of Contents:
“...; A.V. Rubanovich et al -- Radioecology Of The Future: The Problem Of Final Geological Disposal...”View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“... Weighting Methods -- Controlled Physical Random Functions -- Experimental Hardware for Coating PUFs...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“... Secure Protocols and Open Problems (Invited Talk) -- Almost Secure 1-Round Message Transmission Scheme...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“...-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Programs -- The Case for Nuclear Energy -- Nuclear Safety and Energy Security -- Nuclear Energy and Social...”View full text
Electronic
eBook
11
Published 2007
Table of Contents:
“... Causes of Implementation Problems and Proven Ways to Overcome them -- A Security Architecture...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“... Study with the HC Series of Stream Ciphers -- Performance and Security Evaluation of AES S-Box-Based...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“...-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm -- Hash Functions – II -- Analysis...”View full text
Electronic
eBook
14
Published 2012
Table of Contents:
“... with Jumps -- Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem -- Improving the cAnt...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... of the DES -- Robust Key Extraction from Physical Uncloneable Functions -- Efficient Constructions for One...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High...”View full text
Electronic
eBook
17
Published 2006
Table of Contents:
“... Cryptography: Physical Unclonable Functions -- Regular Papers -- Low-Cost Elliptic Curve Cryptography...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“...Invited Talk 1 -- The Physical Basis of RFID Security -- Session 1 -- Still and Silent: Motion...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... and Forecasting Regional Atmospheric Processes -- Numerical Forecast of Air Pollution — Advances and Problems...”View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“... Approximation of S-box Functions -- Random Generation of S-Boxes for Block Ciphers -- Problems of Sending...”View full text
Electronic
eBook



