1
Published 2006
Table of Contents: ...Abstracts of Invited Talks -- Security and Cooperation in Wireless Networks -- Grey-Box...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... -- Network Traffic Analysis and SCADA Security -- Mobile Ad Hoc Network Routing -- Security for Ad Hoc...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...
View full text
Electronic eBook
9
Published 2012
Table of Contents: ...Virtualization -- Trusted VM Snapshots in Untrusted Cloud Infrastructures -- Secure and Robust...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... -- Identification of Security Requirements in Systems of Systems by Functional Security Analysis -- Implementing...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... -- Typing Asymmetric Client-Server Interaction -- Equational Reasoning on Ad Hoc Networks -- Towards a...
View full text
Electronic eBook
12
by Powers, David., Powers, David.
Published 2014
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
13
by Townsend, RJ., Townsend, RJ.
Published 2010
Table of Contents: ... Web Site -- Adding Content Types and Fields -- People, Roles, and Permissions -- Enabling...
View full text
Electronic eBook
14
by Powers, David., Powers, David.
Published 2010
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
15
by Powers, David., Powers, David.
Published 2007
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
16
by Berube, David., Berube, David.
Published 2007
Table of Contents: ... Web Applications with mongrel -- Transferring Files Securely with net-sftp -- Executing Commands...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...
View full text
Electronic eBook
18
Published 2014
Subjects: ...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...
View full text
Electronic eBook
20
Table of Contents: ... from .NET Applications -- Deploying Reports -- Managing Reports -- Securing Reports -- Delivering...
View full text
Electronic eBook