Showing 1 - 20 results of 7,740 for search 'Application Security', query time: 0.12s Refine Results
  1. 1
    Published 2016
    Subjects: “…Computer security.…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 2
    by Zhang, Mu, Yin, Heng
    Published 2016
    Table of Contents: “… and Context-Aware Privacy Leakage Confinement -- Automatic Generation of Security-Centric Descriptions…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    Published 2015
    Table of Contents: “…Malware detection -- Mobile security -- Vulnerability analysis -- Applied cryptography -- Network…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 4
    Published 2001
    Table of Contents: “… for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 5
    Published 2004
    Table of Contents: “…Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2019
    Table of Contents: “…Systems Security -- Analysis and Visualization of Threats -- Applied Crypto.…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2018
    Table of Contents: “…Attack and defense -- Theory in security -- Web security and emerging technologies -- Systems…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2007
    Table of Contents: “…Public Key Crypto Applications/Virus Protection -- Controllable Ring Signatures -- Efficient User…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2006
    Table of Contents: “… on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Published 2017
    Table of Contents: “…Network security -- Threat analysis -- Application security -- Cryptographic protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
    Published 2009
    Table of Contents: “… -- Application Security and Trust Management -- Image-Feature Based Human Identification Protocols on Limited…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 2009
    Table of Contents: “… and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 2010
    Table of Contents: “… O2 Platform - Open Platform for Automating Application Security Knowledge and Workflows…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 2014
    Table of Contents: “…Cryptography -- Social network security -- Mobile security -- Network security -- Future…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2005
    Table of Contents: “…Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2007
    Table of Contents: “… on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Table of Contents: “… of Biometrics -- Securing Biometrics Applications -- Critical Evaluation And Discussion -- Conclusion.…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2011
    Subjects: “…Computer security.…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
  20. 20
    Published 2012
    Subjects: “…Computer security.…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search