Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
https functionality » its functionality, bags functionality, cross functionality
processes function » processes functions, processes functional, processes friction
function https » functions https, fiction https
securing https » security http, securing rtp, securities https
https functionality » its functionality, bags functionality, cross functionality
processes function » processes functions, processes functional, processes friction
function https » functions https, fiction https
securing https » security http, securing rtp, securities https
1
Table of Contents:
“...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...”
View full text
View full text
Electronic
eBook
2
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“...Legal, Technical and Social Aspects of Security -- Regulating Information Security: A Matter...”View full text
Electronic
eBook
4
Table of Contents:
“...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...”
View full text
View full text
Electronic
eBook
5
Table of Contents:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
View full text
View full text
Electronic
eBook
6
Published 2013
Table of Contents:
“... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...”View full text
Electronic
eBook
10
11
Published 2012
Subjects:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“...Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key...”View full text
Electronic
eBook
13
Published 2008
Table of Contents:
“... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security...”View full text
Electronic
eBook
17
Published 2006
Table of Contents:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”View full text
Electronic
eBook
18
Published 2013
Table of Contents:
“...A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“...) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile...”View full text
Electronic
eBook
20
Published 2012
Table of Contents:
“... of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based...”View full text
Electronic
eBook



