Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
process definitions » process definition, concepts definitions
https functionality » its functionality, bags functionality, cross functionality
definitions https » definitions matter, functions https, definitions app
functionality security » functionality securing, functional security, functionality usability
process definitions » process definition, concepts definitions
https functionality » its functionality, bags functionality, cross functionality
definitions https » definitions matter, functions https, definitions app
1
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
2
Table of Contents:
“...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...”
View full text
View full text
Electronic
eBook
3
Published 2013
Table of Contents:
“... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“... Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... Bands Detectors Exploiting Cyclic Autocorrelation Function Sparsity -- Intersystem Coexistence...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“...: DEFINITIONS AND CURRENT TRENDS1 -- SECURITY AND THE ENVIRONMENT IN THE MIDDLE EAST WATER ISSUES -- POTENTIAL...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... in Agent-Based Evolutionary Optimization -- An Immunological and an Ethically-social Approach to Security...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... Management Concepts by Proposing New Definitions -- Towards Process-Aware Cross-Organizational Human Resource...”View full text
Electronic
eBook
9
Published 2013
Table of Contents:
“... Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... -- Showing Invariance Compositionally for a Process Algebra for Network Protocols -- A Computer-Algebra-Based...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... -- Decision on Replacing Components of Security Functions in COTS-Based Information Systems -- Best Papers...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... of Trust to E-Learning -- Advanced Tool to Develop the Assessment Process in Collaborative e-Learning...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... on the sea surface and the bottom.References.Monitoring Physical Processes -- Introduction.Definition...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“...Keynote -- Security Issues for the Use of Semantic Web in E-Commerce -- Business Process Management...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“...-Driven SOA -- Towards Using Reo for Compliance-Aware Business Process Modeling -- On the Risk Management...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... for Definition Questions using Information Gain and Machine Learning -- Batch Reinforcement Learning...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“... for Solar Hydrogen Generation Process -- Voltage regulation in Resonant Coupled Systems for Near Field Power...”View full text
Electronic
eBook
18
Published 2015
Table of Contents:
“... Estimation Precision Tuning.-Functional and Non-functional Size Measurement with IFPUG FPA and SNAP — Case...”View full text
Electronic
eBook
19
Table of Contents:
“... and Acquisitions: Definitions, Process, and Analysis -- Risk Management in Mergers and Acquisitions -- Hostile...”
View full text
View full text
Electronic
eBook
20
Published 2006
Table of Contents:
“... Processes -- A Dolev-Yao-Based Definition of Abuse-Free Protocols -- Secrecy and Protocol Analysis...”View full text
Electronic
eBook



