Search alternatives:
processing security » processing series
function structures » functions structures, function structure, functional structures
https function » its function, sites function, ups function
1
by Maes, Roel., Maes, Roel.
Published 2013
Table of Contents: ...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...
View full text
Electronic eBook
2
Table of Contents: ...-Processing -- Parallelization of PUF Cells -- Pre-Selection -- PUF Biasing -- Two Stage PUF -- PUF...
View full text
Electronic eBook
3
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ...) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile...
View full text
Electronic eBook
6
Published 2012
Table of Contents: ... of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... with Perceptually Monitored Structure for Multiband CELP-Coders -- The Color Information as a Feature for Postage...
View full text
Electronic eBook
10
Published 2012
Table of Contents: ... -- Combining Cryo-Em And X-Ray Crystallography To Study Membrane Protein Structure And Function; W. Kühlbrandt...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... and VLSI Designs -- Information Security Best Practices -- Smart Card Security -- Graphics Processing Units...
View full text
Electronic eBook
12
Published 2013
Table of Contents: ...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ...ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...
View full text
Electronic eBook
16
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions...
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... -- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear...
View full text
Electronic eBook
20
Published 2013
Table of Contents: ... of Innovations using Nanomaterials based CBRNE Sensors and Threat Mitigation -- New Terahertz Security...
View full text
Electronic eBook