Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
processing computing » processing computer, processing computational, processing conditions
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
processing computing » processing computer, processing computational, processing conditions
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Published 2015
Table of Contents:
“...Software Engineering: Non-functional Property Aware Brokerage Approach for Cloud Service Discovery...”View full text
Electronic
eBook
2
Table of Contents:
“...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...”
View full text
View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... Investigation” in the Computer Environment: Legal Aspects -- Identity, Information Security and Rights...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...”View full text
Electronic
eBook
5
Published 2013
Table of Contents:
“...A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature...”View full text
Electronic
eBook
6
Published 2006
Table of Contents:
“...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”View full text
Electronic
eBook
8
Published 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”View full text
Electronic
eBook
9
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
10
Published 2015
Table of Contents:
“..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...”View full text
Electronic
eBook
11
Published 2014
Table of Contents:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”View full text
Electronic
eBook
12
Published 2005
Table of Contents:
“... -- Towards a Cyber Security Reporting System – A Quality Improvement Process -- Security Research from a...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“...-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy...”View full text
Electronic
eBook
14
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
15
Published 2013
Table of Contents:
“... Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally...”View full text
Electronic
eBook
16
Published 2014
Table of Contents:
“... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...”View full text
Electronic
eBook
17
Published 2011
Subjects:
“...Management of Computing and Information Systems. https://scigraph.springernature.com/ontologies...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... Algorithm for Characteristic Points Evaluation in Static Images of Signatures -- Computer Security Systems...”View full text
Electronic
eBook
19
Table of Contents:
“...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...”
View full text
View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“...Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key...”View full text
Electronic
eBook



