1
Cyhoeddwyd 2010
Tabl Cynhwysion: ...) -- Wireless Network Security -- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile...
Cael y testun llawn
Electronig eLyfr
2
Cyhoeddwyd 2010
Tabl Cynhwysion: ... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...
Cael y testun llawn
Electronig eLyfr
3
Cyhoeddwyd 2006
Tabl Cynhwysion: ... -- Impossibility Proofs for RSA Signatures in the Standard Model -- Selecting Secure Passwords -- Human...
Cael y testun llawn
Electronig eLyfr
4
Cyhoeddwyd 2010
Tabl Cynhwysion: ...EternalS: Mission and Roadmap -- to the EternalS Track: Trustworthy Eternal Systems via Evolving...
Cael y testun llawn
Electronig eLyfr
5
Cyhoeddwyd 2007
Tabl Cynhwysion: ... Logical Rule Generations Based on the Genetic Programming and Its Applications to Data Mining...
Cael y testun llawn
Electronig eLyfr
6
Cyhoeddwyd 2013
Tabl Cynhwysion: ... in mastering the value function of security measures -- Reduction of computational cost in mutation testing...
Cael y testun llawn
Electronig eLyfr
7
Cyhoeddwyd 2010
Tabl Cynhwysion: ...Mission Capable Autonomous Control Systems in the Oceans, in the Air and in Space -- Three Paths...
Cael y testun llawn
Electronig eLyfr
8
Cyhoeddwyd 2005
Tabl Cynhwysion: ... Design -- A Data Warehouse Engineering Process -- Aggregation and Analysis of Spatial Data by Means...
Cael y testun llawn
Electronig eLyfr
9
Cyhoeddwyd 2007
Tabl Cynhwysion: ... Complex Event Processing Based on RFID Standards -- Physical/Cyber Objects Management Framework...
Cael y testun llawn
Electronig eLyfr
10
Cyhoeddwyd 2006
Tabl Cynhwysion: ... -- Detecting and Repairing Anomalous Evolutions in Noisy Environments: Logic Programming Formalization...
Cael y testun llawn
Electronig eLyfr