Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
evaluation https » education https
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
evaluation https » education https
securing https » security https, security http, securing rtp
1
by Debbabi, Mourad., Debbabi, Mourad., Saleh, Mohamed., Talhi, Chamseddine., Zhioua, Sami.
Published 2007
Table of Contents:
“... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...”Published 2007
View full text
Electronic
eBook
2
Published 2005
Table of Contents:
“... of Designs -- The Application of an Object-Oriented Method in Information System Security Evaluation...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
5
Subjects:
“...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...”
View full text
View full text
Electronic
eBook
6
Published 2012
Table of Contents:
“... Fault Injection Framework for Evaluating Multicore Systems -- Meeting Real-Time Requirements with Multi...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“... -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Programs -- Engineering an Incremental ASP Solver -- Concurrent and Local Evaluation of Normal Programs...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...”View full text
Electronic
eBook
10
Published 2012
Table of Contents:
“... Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... Structure for Incremental Tabled Evaluation -- Dynamic Mixed-Strategy Evaluation of Tabled Logic Programs...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“...Part 1: Nuclear Security and Proliferation -- GAO: Two Decades Evaluating the Impact...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... in Cryptography -- Credentials-Based Authorization: Evaluation and Implementation -- Subexponential Parameterized...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...”View full text
Electronic
eBook
20
Published 2014
Table of Contents:
“... Communication -- The BIOS and Rootkits -- Hardware Security Modules -- Security Evaluation and Common Criteria...”View full text
Electronic
eBook



