1
Published 2015
Table of Contents: ...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...
View full text
Electronic eBook
2
Table of Contents: ...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... Investigation” in the Computer Environment: Legal Aspects -- Identity, Information Security and Rights...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...
View full text
Electronic eBook
5
Published 2013
Table of Contents: ...A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
View full text
Electronic eBook
8
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
10
Published 2015
Table of Contents: ..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...
View full text
Electronic eBook
14
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
15
Published 2013
Table of Contents: ... Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...
View full text
Electronic eBook
17
Published 2011
Subjects: ...Management of Computing and Information Systems. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...
View full text
Electronic eBook
19
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
View full text
Electronic eBook
20
Published 2014
Table of Contents: ...Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key...
View full text
Electronic eBook