1
Published 2006
Table of Contents: ... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems...
View full text
Electronic eBook
3
Published 2014
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...
View full text
Electronic eBook
4
Table of Contents: ...An Introduction to Reconfigurable Computing. What is RC? RC Architectures. How did RC originate...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... -- Setting up an Effective Information Security Awareness Programme -- Saferinternet.pl Project — Educational...
View full text
Electronic eBook
6
Published 2013
Table of Contents: ... Configuration Checking in Secure Cooperative Data Access -- 9: Programmable Diagnostic Network Measurement...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ... Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ... -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ...: Distributed Computing and Algorithms I -- Programmer-Centric Conditions for Itanium Memory Consistency -- A...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... Aspects of Network Configurations -- Programmable Network Functionality for Improved QoS of Interactive...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... Embarking On Nuclear Power Programme -- Creating a National Nuclear Regulatory Authority -- Building...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... -- Session 2: Peer-to-Peer Computing -- A Secure P2P Video Conference System for Enterprise Environments...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ... -- Hierarchical Dynamic Power-Gating in FPGAs -- Tools and Compilers -- Hardware Synthesis from Functional...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ..., Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ..., Methodology and Functionality -- Electromagnetic Interactions of Particles with Matter -- The Geant4...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...
View full text
Electronic eBook
17
Published 2014
Table of Contents: ... in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... Control Systems -- A Firmware Verification Tool for Programmable Logic Controllers -- Quantifying...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie–Hellman...
View full text
Electronic eBook