Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
processes functional » proteins functional
https functionality » its functionality, bags functionality, cross functionality
functional https » functions https, function https, functional hop
securing https » security https, security http, securing rtp
1
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
2
by Maes, Roel., Maes, Roel.
Published 2013
Table of Contents: ...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...
View full text
Electronic eBook
3
Table of Contents: ...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...
View full text
Electronic eBook
4
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ... and Application of UV Excimer Lamps in Nanofabrication -- Functionalization of Semiconductor Nanoparticles...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ...Legal, Technical and Social Aspects of Security -- Regulating Information Security: A Matter...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ... Adsorption/Oxidation of Sulfur-Containing Species by Activated Carbon -- Adsorption Properties of Functional...
View full text
Electronic eBook
10
Published 2013
Table of Contents: ... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...
View full text
Electronic eBook
12
Published 2011
Subjects: ...Optical data processing....
View full text
Electronic eBook
13
Published 2012
Subjects: ...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ...-Translational Protein Processing, Folding, Targeting, And Membrane Insertion Of Newly Synthesized Proteins; D...
View full text
Electronic eBook
15
Published 2014
Table of Contents: ...Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
17
Published 2013
Table of Contents: ... -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal...
View full text
Electronic eBook