Search alternatives:
https functioning » status functioning, its functioning, high functioning
program security » program series, process security, program section
functioning peer » functioning other, functioning chapter, functioning _
peer https » gender https
1
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... -- ECG-Based Authentication -- Networking -- Peer-to-Peer Botnets -- Security of Service Networks...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ...-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based...
View full text
Electronic eBook
5
Published 2006
Table of Contents: ... Security Associations for Groups -- Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... Programs with Function Symbols -- The Complexity of Temporal Logic with Until and Since over Ordinals...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...
View full text
Electronic eBook
8
Published 2010
Table of Contents: ... -- Identification of Security Requirements in Systems of Systems by Functional Security Analysis -- Implementing...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... for Real Time Multi-Agent System Functional Requirements -- Do You Get It? User-Evaluated Explainable BDI...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Models of Epistasis -- Partial Orderings for Ranking Help Functions -- Robust Prediction with ANNBFIS...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... Stochastic Programming Problems Using Differential Evolution -- Multi Sensor Fusion Using Fitness Adaptive...
View full text
Electronic eBook
14
by Pathak, Nishith., Pathak, Nishith.
Published 2011
Subjects: ...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... for Software Quality -- Security Scheme for Managing a Large Quantity of Individual Information in RFID...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Templates, Collaborative Workshops, and Peer Reviews -- A Case Study on Tool-Supported Multi-level...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ... for Provably Secure Computation -- Scoring Matrices That Induce Metrics on Sequences -- Data Structures...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ...-Means Cluster Analysis -- Peer-to-Peer Models for Resource Discovery in Large-Scale Grids: A Scalable...
View full text
Electronic eBook