Priporočene teme znotraj vašega iskanja.
Priporočene teme znotraj vašega iskanja.
Poišči alternative:
functionality securing » functionality setting, functionality using, functionality testing
programming function » programming functional, programming functionals, programme function
https functionality » its functionality, bags functionality, cross functionality
function https » functions https, fiction https
securing https » security https, security http, securing rtp
functionality securing » functionality setting, functionality using, functionality testing
programming function » programming functional, programming functionals, programme function
https functionality » its functionality, bags functionality, cross functionality
function https » functions https, fiction https
securing https » security https, security http, securing rtp
1
od Debbabi, Mourad., Debbabi, Mourad., Saleh, Mohamed., Talhi, Chamseddine., Zhioua, Sami.
Izdano 2007
Kazalo:
“... Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis...”Izdano 2007
Polni tekst
Elektronski
eKnjiga
2
Teme:
“...Software Engineering/Programming and Operating Systems. https://scigraph.springernature.com...”
Polni tekst
Polni tekst
Elektronski
eKnjiga
3
Izdano 2008
Kazalo:
“... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...”Polni tekst
Elektronski
eKnjiga
4
Izdano 2010
Kazalo:
“... -- Invited Talk I -- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk...”Polni tekst
Elektronski
eKnjiga
5
Teme:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
Polni tekst
Polni tekst
Elektronski
eKnjiga
6
Teme:
“...Programming Techniques. https://scigraph.springernature.com/ontologies/product-market-codes/I14010...”
Polni tekst
Polni tekst
Elektronski
eKnjiga
7
Izdano 2012
Kazalo:
“... Approximation of Continuous Systems with Trapezoid Step Functions -- Signedness-Agnostic Program Analysis...”Polni tekst
Elektronski
eKnjiga
8
Izdano 2010
Kazalo:
“... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...”Polni tekst
Elektronski
eKnjiga
9
Izdano 2011
Teme:
“...Programming Languages, Compilers, Interpreters. https://scigraph.springernature.com/ontologies...”Polni tekst
Elektronski
eKnjiga
10
Izdano 2007
Kazalo:
“... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...”Polni tekst
Elektronski
eKnjiga
11
Izdano 2005
Kazalo:
“... Testing on Function Block Diagrams -- Comparing Software Measures with Fault Counts Derived from Unit...”Polni tekst
Elektronski
eKnjiga
12
Izdano 2007
Kazalo:
“...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...”Polni tekst
Elektronski
eKnjiga
13
Izdano 2008
Kazalo:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”Polni tekst
Elektronski
eKnjiga
14
Teme:
“...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...”
Polni tekst
Polni tekst
Elektronski
eKnjiga
15
Izdano 2010
Kazalo:
“... Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6...”Polni tekst
Elektronski
eKnjiga
16
Izdano 2012
Kazalo:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”Polni tekst
Elektronski
eKnjiga
17
Izdano 2006
Kazalo:
“... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...”Polni tekst
Elektronski
eKnjiga
18
Izdano 2005
Kazalo:
“... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...”Polni tekst
Elektronski
eKnjiga
19
Izdano 2006
Kazalo:
“...Security Protocols -- Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer...”Polni tekst
Elektronski
eKnjiga
20
Izdano 2005
Kazalo:
“... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...”Polni tekst
Elektronski
eKnjiga



