Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problems practical » problems physical, problems periodicals, problems statistical
practical https » practice https, practical hazops, practical hints
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
problems practical » problems physical, problems periodicals, problems statistical
practical https » practice https, practical hazops, practical hints
1
Published 2008
Table of Contents:
“... over Small Finite Fields of Odd Characteristic -- Secure Computation of the Vector Dominance Problem...”View full text
Electronic
eBook
2
Published 2014
Table of Contents:
“... Sensor Networks -- Data Security and Privacy in the Cloud -- Forbidden City Model – Towards a Practice...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“... Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks...”View full text
Electronic
eBook
4
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems...”View full text
Electronic
eBook
6
Published 2015
Subjects:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“...Theory of Security with Noisy Data -- Unbreakable Keys from Random Noise -- Fuzzy Commitment -- A...”View full text
Electronic
eBook
8
Published 2013
Table of Contents:
“...Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks -- Practical Everlasting...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“...-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”View full text
Electronic
eBook
14
Published 2012
Table of Contents:
“...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... Talk -- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... Protocol for Dynamic Groups -- A Practical Universal Circuit Construction and Secure Evaluation of Private...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook
18
Published 2013
Table of Contents:
“...1: Towards a Unified Modeling and Verification of Network and System Security Configurations -- 2...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“...? -- Phishing Across Interaction Channels: Methods, Experience and Best Practice -- IT-Security Beyond Borders...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...”View full text
Electronic
eBook



