Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
program aggregation » problems aggregation, protein aggregation, pro aggregation
https functionality » its functionality, bags functionality, cross functionality
aggregation https » aggregation acts, aggregation sites, aggregation cross
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
program aggregation » problems aggregation, protein aggregation, pro aggregation
https functionality » its functionality, bags functionality, cross functionality
aggregation https » aggregation acts, aggregation sites, aggregation cross
securing https » security https, security http, securing rtp
1
Published 2008
Table of Contents:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... -- Oblivious Scalar-Product Protocols -- On Optimizing the k-Ward Micro-aggregation Technique for Secure...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... Revisited: Semantics and Representation of Aggregates -- Compiling Fuzzy Answer Set Programs to Fuzzy...”View full text
Electronic
eBook
6
Published 2014
Table of Contents:
“... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... -- Aggregates for CHR through Program Transformation -- Preserving Sharing in the Partial Evaluation of Lazy...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“... Transaction Logic -- On Compiling Linear Logic Programs with Comprehensions, Aggregates and Rule...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... and Certified Linked Implementation Using Orbits -- A Verified Generate-Test-Aggregate Coq Library for Parallel...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... Filtering -- An AI-Based Causal Strategy for Securing Statistical Databases Using Micro-aggregation...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“... -- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing -- The Generalized...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“...Universal Signature Aggregators -- Fully Structure-Preserving Signatures and Shrinking Commitments...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“...Hash Function Cryptanalysis -- Security of MD5 Challenge and Response: Extension of APOP Password...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... Protocols with a Leader -- On Self-stabilizing Search Trees -- Efficient Dynamic Aggregation -- Groupings...”View full text
Electronic
eBook
17
Table of Contents:
“... -- CLR Stored Procedures -- User-Defined Functions -- User-Defined Types -- User-Defined Aggregates...”
View full text
View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“... Sensor Networks -- Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“...Invited Talks -- Regular Labelings and Geometric Structures -- Algorithmic Aspects of Secure...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“...-Aggregates of Primary Spherical Particules by Radial Distribution Functions....”View full text
Electronic
eBook



