1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...
View full text
Electronic eBook
8
Table of Contents: ... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
11
Subjects: ...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...Session 1 -- Reliability Analysis of Safety-Related Communication Architectures -- A Novel HAZOP...
View full text
Electronic eBook
14
Published 2012
Table of Contents: ... Infrastructure via Enhanced SIEM Technology -- On Securing Communications among Federated Health Information...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack...
View full text
Electronic eBook
17
Subjects: ...Computer Communication Networks. https://scigraph.springernature.com/ontologies/product-market...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... for Sublinear Space Functional Programming -- Session 9 -- Liveness of Communicating Transactions (Extended...
View full text
Electronic eBook