Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
processes functional » proteins functional
https functionality » its functionality, bags functionality, cross functionality
functional https » functions https, function https, functional hop
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
processes functional » proteins functional
https functionality » its functionality, bags functionality, cross functionality
functional https » functions https, function https, functional hop
securing https » security https, security http, securing rtp
1
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
2
Table of Contents:
“...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...”
View full text
View full text
Electronic
eBook
3
Table of Contents:
“...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...”
View full text
View full text
Electronic
eBook
4
Table of Contents:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
View full text
View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... and Application of UV Excimer Lamps in Nanofabrication -- Functionalization of Semiconductor Nanoparticles...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“...Legal, Technical and Social Aspects of Security -- Regulating Information Security: A Matter...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... Adsorption/Oxidation of Sulfur-Containing Species by Activated Carbon -- Adsorption Properties of Functional...”View full text
Electronic
eBook
10
Published 2013
Table of Contents:
“... Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...”View full text
Electronic
eBook
12
13
Published 2012
Subjects:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”View full text
Electronic
eBook
14
Published 2012
Table of Contents:
“...-Translational Protein Processing, Folding, Targeting, And Membrane Insertion Of Newly Synthesized Proteins; D...”View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“...Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...”View full text
Electronic
eBook
17
Published 2013
Table of Contents:
“... -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal...”View full text
Electronic
eBook



