Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
https functioning » status functioning, its functioning, high functioning
program security » program series, process security, program section
functioning peer » functioning other, functioning chapter, functioning _
peer https » gender https
https functioning » status functioning, its functioning, high functioning
program security » program series, process security, program section
functioning peer » functioning other, functioning chapter, functioning _
peer https » gender https
1
Published 2010
Table of Contents:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... -- ECG-Based Authentication -- Networking -- Peer-to-Peer Botnets -- Security of Service Networks...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... -- Cryptographic Applications -- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? -- A Handy...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“...-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based...”View full text
Electronic
eBook
5
Published 2006
Table of Contents:
“... Security Associations for Groups -- Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer...”View full text
Electronic
eBook
6
Published 2007
Table of Contents:
“... Programs with Function Symbols -- The Complexity of Temporal Logic with Until and Since over Ordinals...”View full text
Electronic
eBook
7
Published 2006
Table of Contents:
“...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... -- Identification of Security Requirements in Systems of Systems by Functional Security Analysis -- Implementing...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... for Real Time Multi-Agent System Functional Requirements -- Do You Get It? User-Evaluated Explainable BDI...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Models of Epistasis -- Partial Orderings for Ranking Help Functions -- Robust Prediction with ANNBFIS...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... Stochastic Programming Problems Using Differential Evolution -- Multi Sensor Fusion Using Fitness Adaptive...”View full text
Electronic
eBook
14
Subjects:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
View full text
View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... for Software Quality -- Security Scheme for Managing a Large Quantity of Individual Information in RFID...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Templates, Collaborative Workshops, and Peer Reviews -- A Case Study on Tool-Supported Multi-level...”View full text
Electronic
eBook
17
Published 2006
Table of Contents:
“... for Provably Secure Computation -- Scoring Matrices That Induce Metrics on Sequences -- Data Structures...”View full text
Electronic
eBook
18
Published 2010
Table of Contents:
“...Green Computing and Health Care Informatics -- Lot-Size Planning with Non-linear Cost Functions...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“...-Means Cluster Analysis -- Peer-to-Peer Models for Resource Discovery in Large-Scale Grids: A Scalable...”View full text
Electronic
eBook



