Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality security » functionality securing, functional security, functionality usability
program communication » program communicating, pictogram communication, programs communicating
communication https » computation https
https functionality » its functionality, bags functionality, cross functionality
functionality security » functionality securing, functional security, functionality usability
program communication » program communicating, pictogram communication, programs communicating
communication https » computation https
https functionality » its functionality, bags functionality, cross functionality
1
Published 2008
Table of Contents:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”View full text
Electronic
eBook
4
Published 2010
Table of Contents:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...”View full text
Electronic
eBook
8
by Debbabi, Mourad., Debbabi, Mourad., Saleh, Mohamed., Talhi, Chamseddine., Zhioua, Sami.
Published 2007
Table of Contents:
“... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...”Published 2007
View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
11
Subjects:
“...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...”
View full text
View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“...Session 1 -- Reliability Analysis of Safety-Related Communication Architectures -- A Novel HAZOP...”View full text
Electronic
eBook
14
Published 2012
Table of Contents:
“... Infrastructure via Enhanced SIEM Technology -- On Securing Communications among Federated Health Information...”View full text
Electronic
eBook
15
Published 2005
Table of Contents:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack...”View full text
Electronic
eBook
17
by Jungck, Peder., Jungck, Peder., An SAIC Company, CloudShield Technologies Inc., Duncan, Ralph., Mulcahy, Dwight.
Published 2011
Subjects:
“...Computer Communication Networks. https://scigraph.springernature.com/ontologies/product-market...”Published 2011
View full text
Electronic
eBook
18
Published 2006
Table of Contents:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... for Sublinear Space Functional Programming -- Session 9 -- Liveness of Communicating Transactions (Extended...”View full text
Electronic
eBook



