Search alternatives:
function computing » education computing, generation computing
process security » processing security, process maturity, protocols security
https function » its function, sites function, ups function
1
Table of Contents: ...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...
Ligazón do recurso
Electrónico eBook
2
Publicado 2015
Table of Contents: ...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...
Ligazón do recurso
Electrónico eBook
3
Publicado 2007
Table of Contents: ... Investigation” in the Computer Environment: Legal Aspects -- Identity, Information Security and Rights...
Ligazón do recurso
Electrónico eBook
4
Publicado 2006
Table of Contents: ... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...
Ligazón do recurso
Electrónico eBook
5
Publicado 2013
Table of Contents: ...A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature...
Ligazón do recurso
Electrónico eBook
6
Publicado 2006
Table of Contents: ...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...
Ligazón do recurso
Electrónico eBook
7
Publicado 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
Ligazón do recurso
Electrónico eBook
8
Publicado 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
Ligazón do recurso
Electrónico eBook
9
Publicado 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
Ligazón do recurso
Electrónico eBook
10
Publicado 2015
Table of Contents: ..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...
Ligazón do recurso
Electrónico eBook
11
Publicado 2014
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...
Ligazón do recurso
Electrónico eBook
12
Publicado 2005
Table of Contents: ... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...
Ligazón do recurso
Electrónico eBook
13
Publicado 2007
Table of Contents: ...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...
Ligazón do recurso
Electrónico eBook
14
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
Ligazón do recurso
Electrónico eBook
15
Publicado 2013
Table of Contents: ... Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally...
Ligazón do recurso
Electrónico eBook
16
Publicado 2014
Table of Contents: ... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...
Ligazón do recurso
Electrónico eBook
17
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
Ligazón do recurso
Electrónico eBook
18
Publicado 2011
Subjects: ...Management of Computing and Information Systems. https://scigraph.springernature.com/ontologies...
Ligazón do recurso
Electrónico eBook
19
Publicado 2006
Table of Contents: ... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...
Ligazón do recurso
Electrónico eBook
20
por Maes, Roel., Maes, Roel.
Publicado 2013
Table of Contents: ...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...
Ligazón do recurso
Electrónico eBook