Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
problems securing » problems security, problems occurring, problems requiring
securing https » security https, security http, securing rtp
https function » its function, sites function, ups function
function java » function jane, function jason, function james
problems securing » problems security, problems occurring, problems requiring
securing https » security https, security http, securing rtp
https function » its function, sites function, ups function
function java » function jane, function jason, function james
1
Published 2008
Table of Contents:
“... -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers...”View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“... Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems...”View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“... -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“...Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Problem -- A Development of Data-Logger for Indoor Environment -- Multiobjective Evolutionary Optimization...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“... Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“...Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack...”View full text
Electronic
eBook
10
Published 2015
Table of Contents:
“... -- Progress (and Lack Thereof) for Graph Coloring Approximation Problems -- Recent Results in Scalable Multi...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... on Real Space and Digital Space Symbiosis -- Workshop on Information Retrieval, Security and Innovative...”View full text
Electronic
eBook
12
Published 2013
Table of Contents:
“... -- Generating Artificial Neural Networks for Value Function Approximation in a Domain Requiring a Shifting...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“...Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode...”View full text
Electronic
eBook
14
Published 2015
Table of Contents:
“...A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... Challenge -- A Structured Set of Higher-Order Problems -- Formal Modeling of a Slicing Algorithm for Java...”View full text
Electronic
eBook
16
Published 2011
Table of Contents:
“...From the content: Patterns improving the Common Criteria compliant IT security development process...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... Foundation for Security -- Combining Domain-Specific and Foundational Logics to Verify Complete Software...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“... Procedures -- Session 2: Specific Theories -- Proving Bounds on Real-Valued Functions with Computations...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... of Novel Stochastic Methods of Function Recovery -- Automatic Face Analysis System Based on Face...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... Computing for High-Security/High-Performance Ambient Systems -- FPL-3E: Towards Language Support...”View full text
Electronic
eBook



