Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
program computation » program computational, program compilation, programs competition
https functionality » its functionality, bags functionality, cross functionality
computation https » computing https
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
program computation » program computational, program compilation, programs competition
https functionality » its functionality, bags functionality, cross functionality
computation https » computing https
securing https » security https, security http, securing rtp
1
Published 2006
Table of Contents:
“... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...”View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems...”View full text
Electronic
eBook
6
Published 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”View full text
Electronic
eBook
7
by Debbabi, Mourad., Debbabi, Mourad., Saleh, Mohamed., Talhi, Chamseddine., Zhioua, Sami.
Published 2007
Table of Contents:
“... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...”Published 2007
View full text
Electronic
eBook
8
9
Published 2010
Table of Contents:
“... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”View full text
Electronic
eBook
12
Published 2007
Table of Contents:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”View full text
Electronic
eBook
13
Published 2012
Table of Contents:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”View full text
Electronic
eBook
14
Published 2011
Subjects:
“...Programming languages (Electronic computers)....”View full text
Electronic
eBook
15
Published 2006
Table of Contents:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”View full text
Electronic
eBook
17
Subjects:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
View full text
View full text
Electronic
eBook
18
19
Published 2006
Table of Contents:
“... Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... -- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge...”View full text
Electronic
eBook



