Gesuggereerde onderwerpen binnen jouw zoekopdracht.
Gesuggereerde onderwerpen binnen jouw zoekopdracht.
Alternatieven:
functionality setting » functionality testing, functionality securing, functional setting
processing security » processing series
https functionality » its functionality, bags functionality, cross functionality
setting https » being https, writing https, feeding https
functionality setting » functionality testing, functionality securing, functional setting
processing security » processing series
https functionality » its functionality, bags functionality, cross functionality
setting https » being https, writing https, feeding https
1
Inhoudsopgave:
“...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...”
Volledige tekst
Volledige tekst
Elektronisch
E-boek
2
Gepubliceerd in 2007
Inhoudsopgave:
“... -- Setting up an Effective Information Security Awareness Programme -- Saferinternet.pl Project — Educational...”Volledige tekst
Elektronisch
E-boek
3
Gepubliceerd in 2006
Inhoudsopgave:
“...? -- Physical Unclonable Functions for enhanced security of tokens and tags -- Hardware Security Features...”Volledige tekst
Elektronisch
E-boek
4
Gepubliceerd in 2007
Inhoudsopgave:
“... Design with Fuzzy Functions -- Soft Computing in Medical Image Processing -- Image Analysis of Ductal...”Volledige tekst
Elektronisch
E-boek
5
Gepubliceerd in 2005
Inhoudsopgave:
“... Rough Sets Model in the Analysis of Process Data -- CRST: A Generalization of Rough Set Theory...”Volledige tekst
Elektronisch
E-boek
6
Gepubliceerd in 2014
Inhoudsopgave:
“... with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional...”Volledige tekst
Elektronisch
E-boek
7
Gepubliceerd in 2007
Inhoudsopgave:
“... Fuzzy Model with a Chain Model -- Singleton Representation of Fuzzy Set for Computing Fuzzy Model...”Volledige tekst
Elektronisch
E-boek
8
Gepubliceerd in 2014
Inhoudsopgave:
“...Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key...”Volledige tekst
Elektronisch
E-boek
9
Gepubliceerd in 2008
Inhoudsopgave:
“... -- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting -- A Provably Secure One...”Volledige tekst
Elektronisch
E-boek
10
Gepubliceerd in 2006
Inhoudsopgave:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”Volledige tekst
Elektronisch
E-boek
11
Gepubliceerd in 2008
Inhoudsopgave:
“... -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks...”Volledige tekst
Elektronisch
E-boek
12
Gepubliceerd in 2008
Inhoudsopgave:
“... -- An On-Line Secure E-Passport Protocol -- Secure Multi-Coupons for Federated Environments: Privacy-Preserving...”Volledige tekst
Elektronisch
E-boek
13
Gepubliceerd in 2014
Inhoudsopgave:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”Volledige tekst
Elektronisch
E-boek
14
Gepubliceerd in 2014
Inhoudsopgave:
“... in Heterogeneous Setting -- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy...”Volledige tekst
Elektronisch
E-boek
15
Gepubliceerd in 2010
Inhoudsopgave:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”Volledige tekst
Elektronisch
E-boek
16
Gepubliceerd in 2012
Inhoudsopgave:
“... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...”Volledige tekst
Elektronisch
E-boek
17
Gepubliceerd in 2014
Inhoudsopgave:
“... on Instructions Statistics: Algorithm for Deciding Offload Function Set on Mobile Cloud System -- Improved...”Volledige tekst
Elektronisch
E-boek
18
Gepubliceerd in 2010
Inhoudsopgave:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”Volledige tekst
Elektronisch
E-boek
19
Gepubliceerd in 2006
Inhoudsopgave:
“... for Functional Cooperation in the Gulf of Aqaba -- WATER RESOURCES MANAGEMENT AND ENVIRONMENTAL SECURITY...”Volledige tekst
Elektronisch
E-boek
20
Gepubliceerd in 2006
Inhoudsopgave:
“... in Agent-Based Evolutionary Optimization -- An Immunological and an Ethically-social Approach to Security...”Volledige tekst
Elektronisch
E-boek



