Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
statistical https » statistics https, statistical atlas, statistical attacks
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
statistical https » statistics https, statistical atlas, statistical attacks
1
Published 2014
Table of Contents:
“...Tabular Data Protection -- Enabling Statistical Analysis of Suppressed Tabular Data -- Assessing...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... -- Integral Invariants and Shape Matching -- On the Representation of Shapes Using Implicit Functions...”View full text
Electronic
eBook
3
Table of Contents:
“...Chap. 1 - Introduction and Preview -- Chap. 2 - Physically Unclonable Functions: Concept...”
View full text
View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... Statistical Databases -- Provable Security -- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks...”View full text
Electronic
eBook
6
Published 2012
Table of Contents:
“... of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“..., G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... and Application of UV Excimer Lamps in Nanofabrication -- Functionalization of Semiconductor Nanoparticles...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”View full text
Electronic
eBook
13
Published 2012
Table of Contents:
“... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... of Catastrophe Bonds -- Common Functional Implied Volatility Analysis -- Implied Trinomial Trees -- Heston...”View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“... on Instructions Statistics: Algorithm for Deciding Offload Function Set on Mobile Cloud System -- Improved...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“...-core Platforms -- A Paradigm for Processing Network Protocols in Parallel -- Real-Time Task Scheduling...”View full text
Electronic
eBook
17
Published 2006
Table of Contents:
“... for Functional Cooperation in the Gulf of Aqaba -- WATER RESOURCES MANAGEMENT AND ENVIRONMENTAL SECURITY...”View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... in Agent-Based Evolutionary Optimization -- An Immunological and an Ethically-social Approach to Security...”View full text
Electronic
eBook
19
Advances in Multimedia Information Processing - PCM 2005 6th Pacific Rim Conference on Multimedia...
Published 2005
Table of Contents:
“... Renegotiating Mechanism for Guaranteed End-to-End QoS over DiffServ Networks -- Secure and Efficient ID-Based...”View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“... Variability Modelling in Capability Modelling: Experiences from a Case in Business Process Outsourcing...”View full text
Electronic
eBook



