Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function computing » education computing, generation computing
process security » processing security, process maturity, protocols security
https function » its function, sites function, ups function
function computing » education computing, generation computing
process security » processing security, process maturity, protocols security
https function » its function, sites function, ups function
1
Table of Contents:
“...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...”
Ligazón do recurso
Ligazón do recurso
Electrónico
eBook
2
Publicado 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”Ligazón do recurso
Electrónico
eBook
3
Publicado 2007
Table of Contents:
“... Investigation” in the Computer Environment: Legal Aspects -- Identity, Information Security and Rights...”Ligazón do recurso
Electrónico
eBook
4
Publicado 2006
Table of Contents:
“... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...”Ligazón do recurso
Electrónico
eBook
5
Publicado 2013
Table of Contents:
“...A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature...”Ligazón do recurso
Electrónico
eBook
6
Publicado 2006
Table of Contents:
“...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...”Ligazón do recurso
Electrónico
eBook
7
Publicado 2010
Table of Contents:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”Ligazón do recurso
Electrónico
eBook
8
Publicado 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”Ligazón do recurso
Electrónico
eBook
9
Publicado 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”Ligazón do recurso
Electrónico
eBook
10
Publicado 2015
Table of Contents:
“..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...”Ligazón do recurso
Electrónico
eBook
11
Publicado 2014
Table of Contents:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”Ligazón do recurso
Electrónico
eBook
12
Publicado 2005
Table of Contents:
“... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...”Ligazón do recurso
Electrónico
eBook
13
Publicado 2007
Table of Contents:
“...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...”Ligazón do recurso
Electrónico
eBook
14
por Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Publicado 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Publicado 2014
Ligazón do recurso
Electrónico
eBook
15
Publicado 2013
Table of Contents:
“... Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally...”Ligazón do recurso
Electrónico
eBook
16
Publicado 2014
Table of Contents:
“... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...”Ligazón do recurso
Electrónico
eBook
17
Table of Contents:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
Ligazón do recurso
Ligazón do recurso
Electrónico
eBook
18
Publicado 2011
Subjects:
“...Management of Computing and Information Systems. https://scigraph.springernature.com/ontologies...”Ligazón do recurso
Electrónico
eBook
19
Publicado 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”Ligazón do recurso
Electrónico
eBook
20
Table of Contents:
“...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...”
Ligazón do recurso
Ligazón do recurso
Electrónico
eBook



