Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
programme computing » programming computing, programme creating, programme kampung
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
programme computing » programming computing, programme creating, programme kampung
https functionality » its functionality, bags functionality, cross functionality
securing https » security https, security http, securing rtp
1
Published 2006
Table of Contents:
“... to Monoprocess Servers -- Delegating Secure Logging in Pervasive Computing Systems -- Implementing Minimized...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems...”View full text
Electronic
eBook
3
Published 2014
Table of Contents:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”View full text
Electronic
eBook
4
Table of Contents:
“...An Introduction to Reconfigurable Computing. What is RC? RC Architectures. How did RC originate...”
View full text
View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... -- Setting up an Effective Information Security Awareness Programme -- Saferinternet.pl Project — Educational...”View full text
Electronic
eBook
6
Published 2013
Table of Contents:
“... Configuration Checking in Secure Cooperative Data Access -- 9: Programmable Diagnostic Network Measurement...”View full text
Electronic
eBook
7
Published 2012
Table of Contents:
“... Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“... -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“...: Distributed Computing and Algorithms I -- Programmer-Centric Conditions for Itanium Memory Consistency -- A...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Aspects of Network Configurations -- Programmable Network Functionality for Improved QoS of Interactive...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Embarking On Nuclear Power Programme -- Creating a National Nuclear Regulatory Authority -- Building...”View full text
Electronic
eBook
12
Published 2005
Table of Contents:
“... -- Session 2: Peer-to-Peer Computing -- A Secure P2P Video Conference System for Enterprise Environments...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“... -- Hierarchical Dynamic Power-Gating in FPGAs -- Tools and Compilers -- Hardware Synthesis from Functional...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“..., Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“..., Methodology and Functionality -- Electromagnetic Interactions of Particles with Matter -- The Geant4...”View full text
Electronic
eBook
16
Published 2014
Table of Contents:
“... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...”View full text
Electronic
eBook
17
Published 2014
Table of Contents:
“... in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... Control Systems -- A Firmware Verification Tool for Programmable Logic Controllers -- Quantifying...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie–Hellman...”View full text
Electronic
eBook



