1
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
2
Published 2013
Table of Contents: ... Configuration Checking in Secure Cooperative Data Access -- 9: Programmable Diagnostic Network Measurement...
View full text
Electronic eBook
3
Published 2012
Table of Contents: ... Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random...
View full text
Electronic eBook
4
Published 2007
Table of Contents: ... -- Setting up an Effective Information Security Awareness Programme -- Saferinternet.pl Project — Educational...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...
View full text
Electronic eBook
6
Published 2014
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... Embarking On Nuclear Power Programme -- Creating a National Nuclear Regulatory Authority -- Building...
View full text
Electronic eBook
8
Published 2015
Table of Contents: ... -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ... Aspects of Network Configurations -- Programmable Network Functionality for Improved QoS of Interactive...
View full text
Electronic eBook
10
Table of Contents: ... -- Reconfigurable Logic Devices. Field-Programmable Gate Arrays. Coarse-Grained Reconfigurable Arrays. Summary...
View full text
Electronic eBook
11
by Stowell, D., Stowell, D.
Published 2005
Subjects: ...Investments and Securities. https://scigraph.springernature.com/ontologies/product-market-codes...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...
View full text
Electronic eBook
15
Published 2012
Table of Contents: ... Control Systems -- A Firmware Verification Tool for Programmable Logic Controllers -- Quantifying...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie–Hellman...
View full text
Electronic eBook
18
Published 2012
Table of Contents: ... Functions -- Hash Functions Based on Three Permutations: A Generic Security Analysis.-  Hash or Not to Hash...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ... ASSURANCE -- ADVANCED MRI APPLICATIONS -- PHYSIOLOGICAL AND FUNCTIONAL MRI -- APPLICATIONS OF CLINICAL...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ..., Methodology and Functionality -- Electromagnetic Interactions of Particles with Matter -- The Geant4...
View full text
Electronic eBook