1
Published 2010
Table of Contents: ... on the Reduced-Round Compression Functions of Skein and BLAKE -- Public Key Cryptography -- Practical Algebraic...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ...Ontology-Driven Data Semantics Discovery for Cyber-Security -- State Space Planning Using...
View full text
Electronic eBook
3
Published 2010
Table of Contents: ... and Implementations for Coroutines -- Liberal Typing for Functional Logic Programs -- Session 2 -- A Provably Correct...
View full text
Electronic eBook
4
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook
5
by Berube, David., Berube, David.
Published 2007
Table of Contents: ... Web Applications with mongrel -- Transferring Files Securely with net-sftp -- Executing Commands...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ...-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... Computation -- Propositional Interpolation and Abstract Interpretation -- Functional Programming in Sublinear...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Semantics for Hybrid Systems -- Full Abstraction for Linda -- Practical Programming with Higher-Order...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ... Verification for Higher-Order Functional Programs -- An Abstract Domain to Infer Ordinal-Valued Ranking...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
14
Published 2006
Table of Contents: ... Key Generation for Multi-layer Ad-Hoc Networks -- Enabling Secure Discovery in a Pervasive Environment...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... -- Nondeterminism Analysis of Functional Logic Programs -- Techniques for Scaling Up Analyses Based on Pre...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ...Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism...
View full text
Electronic eBook
18
Subjects: ...Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000...
View full text
Electronic eBook
19
Published 2015
Table of Contents: ... and Effectiveness of U.S. Nuclear and Radiological Material Security Programs -- Neutralizing Radicalized Threat...
View full text
Electronic eBook
20
Table of Contents: ... -- The Dynamic Host Configuration Protocol (DHCPv6) -- Bridging the DNS Gap -- New Functionalities -- IP Security...
View full text
Electronic eBook