Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programme function » programming function, programme action, programs functional
function https » functions https, fiction https
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
https functionality » its functionality, bags functionality, cross functionality
programme function » programming function, programme action, programs functional
function https » functions https, fiction https
securing https » security https, security http, securing rtp
1
Published 2006
Table of Contents:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”View full text
Electronic
eBook
2
Published 2013
Table of Contents:
“... Configuration Checking in Secure Cooperative Data Access -- 9: Programmable Diagnostic Network Measurement...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“... Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random...”View full text
Electronic
eBook
4
Published 2007
Table of Contents:
“... -- Setting up an Effective Information Security Awareness Programme -- Saferinternet.pl Project — Educational...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...”View full text
Electronic
eBook
6
Published 2014
Table of Contents:
“...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... Embarking On Nuclear Power Programme -- Creating a National Nuclear Regulatory Authority -- Building...”View full text
Electronic
eBook
8
Published 2015
Table of Contents:
“... -- On the Security of Distributed Multiprime RSA -- Formal Modeling of Random Oracle Programmability and Verification...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... Aspects of Network Configurations -- Programmable Network Functionality for Improved QoS of Interactive...”View full text
Electronic
eBook
10
Table of Contents:
“... -- Reconfigurable Logic Devices. Field-Programmable Gate Arrays. Coarse-Grained Reconfigurable Arrays. Summary...”
View full text
View full text
Electronic
eBook
11
Subjects:
“...Investments and Securities. https://scigraph.springernature.com/ontologies/product-market-codes...”
View full text
View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems...”View full text
Electronic
eBook
13
Published 2014
Table of Contents:
“... in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... -- Visualization of Five Erosion Risk Classes using Kernel Discriminants -- Computer Security and Safety...”View full text
Electronic
eBook
15
Published 2012
Table of Contents:
“... Control Systems -- A Firmware Verification Tool for Programmable Logic Controllers -- Quantifying...”View full text
Electronic
eBook
16
Published 2006
Table of Contents:
“...Keynote Talk I -- Distributed Security Algorithms by Mobile Agents -- Session I A: Ad Hoc Networks...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie–Hellman...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... Functions -- Hash Functions Based on Three Permutations: A Generic Security Analysis.- Hash or Not to Hash...”View full text
Electronic
eBook
19
Published 2007
Table of Contents:
“... ASSURANCE -- ADVANCED MRI APPLICATIONS -- PHYSIOLOGICAL AND FUNCTIONAL MRI -- APPLICATIONS OF CLINICAL...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“..., Methodology and Functionality -- Electromagnetic Interactions of Particles with Matter -- The Geant4...”View full text
Electronic
eBook



