Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality adding » functionality using, functionality amino, functionality setting
https functionality » its functionality, bags functionality, cross functionality
program security » program series, process security, program section
adding https » aging https, auditing https, banking https
functionality adding » functionality using, functionality amino, functionality setting
https functionality » its functionality, bags functionality, cross functionality
program security » program series, process security, program section
adding https » aging https, auditing https, banking https
1
Published 2006
Table of Contents:
“...Abstracts of Invited Talks -- Security and Cooperation in Wireless Networks -- Grey-Box...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... -- Network Traffic Analysis and SCADA Security -- Mobile Ad Hoc Network Routing -- Security for Ad Hoc...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...”View full text
Electronic
eBook
9
Published 2012
Table of Contents:
“...Virtualization -- Trusted VM Snapshots in Untrusted Cloud Infrastructures -- Secure and Robust...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... -- Identification of Security Requirements in Systems of Systems by Functional Security Analysis -- Implementing...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... -- Typing Asymmetric Client-Server Interaction -- Equational Reasoning on Ad Hoc Networks -- Towards a...”View full text
Electronic
eBook
12
Subjects:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
View full text
View full text
Electronic
eBook
13
Table of Contents:
“... Web Site -- Adding Content Types and Fields -- People, Roles, and Permissions -- Enabling...”
View full text
View full text
Electronic
eBook
14
Subjects:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
View full text
View full text
Electronic
eBook
15
Subjects:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
View full text
View full text
Electronic
eBook
16
Table of Contents:
“... Web Applications with mongrel -- Transferring Files Securely with net-sftp -- Executing Commands...”
View full text
View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... -- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device...”View full text
Electronic
eBook
18
Published 2014
Subjects:
“...Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...”View full text
Electronic
eBook
20
Table of Contents:
“... from .NET Applications -- Deploying Reports -- Managing Reports -- Securing Reports -- Delivering...”
View full text
View full text
Electronic
eBook



