1
Table of Contents: ...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...
View full text
Electronic eBook
2
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ...Legal, Technical and Social Aspects of Security -- Regulating Information Security: A Matter...
View full text
Electronic eBook
4
by Maes, Roel., Maes, Roel.
Published 2013
Table of Contents: ...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...
View full text
Electronic eBook
5
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
View full text
Electronic eBook
6
Published 2013
Table of Contents: ... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...
View full text
Electronic eBook
10
Published 2011
Subjects: ...Optical data processing....
View full text
Electronic eBook
11
Published 2012
Subjects: ...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ...Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
14
Published 2005
Table of Contents: ...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
18
Published 2013
Table of Contents: ...A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ...) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile...
View full text
Electronic eBook
20
Published 2012
Table of Contents: ... of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based...
View full text
Electronic eBook