-
161Published 2015Table of Contents: “… Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric…”
Full Text via HEAL-Link
Electronic eBook -
162Published 2012Table of Contents: “… Detection -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Continual…”
Full Text via HEAL-Link
Electronic eBook -
163Published 2017Table of Contents: “… Delay Hybrid CSP -- Security -- Taming Message-passing Communication in Compositional Reasoning about…”
Full Text via HEAL-Link
Electronic eBook -
164Published 2004Table of Contents: “… for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism…”
Full Text via HEAL-Link
Electronic eBook -
165Published 2014Table of Contents: “…COMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT…”
Full Text via HEAL-Link
eBook -
166Published 2015Table of Contents: “… Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol…”
Full Text via HEAL-Link
Electronic eBook -
167by Salomon, DavidTable of Contents: “…Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention…”
Published 2010
Full Text via HEAL-Link
Electronic eBook -
168Published 1999Table of Contents: “… as Specifications of Access Policies -- Security Properties of Typed Applets -- Concepts -- The Role of Trust…”
Full Text via HEAL-Link
Electronic eBook -
169Published 2006Table of Contents: “…Security Analysis and Attacks -- Security Weakness in Ren et al.’s Group Key Agreement Scheme Built…”
Full Text via HEAL-Link
Electronic eBook -
170Published 2007Table of Contents: “…Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family…”
Full Text via HEAL-Link
Electronic eBook -
171Published 2010Table of Contents: “… on Cryptographic Hardware -- Security and Scalability of Remote Entrusting Protection -- Adaptive Security…”
Full Text via HEAL-Link
Electronic eBook -
172Published 2015Table of Contents: “… Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware…”
Full Text via HEAL-Link
Electronic eBook -
173Published 2007Table of Contents: “… Machines in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks…”
Full Text via HEAL-Link
Electronic eBook -
174Published 2007Table of Contents: “… -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical…”
Full Text via HEAL-Link
Electronic eBook -
175Published 2012Table of Contents: “…Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks…”
Full Text via HEAL-Link
Electronic eBook -
176Published 2008Table of Contents: “…New Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication…”
Full Text via HEAL-Link
Electronic eBook -
177Published 1998Table of Contents: “…A review of the SESAME development -- The security of public key cryptosystems based on integer…”
Full Text via HEAL-Link
Electronic eBook -
178Published 2017Table of Contents: “… Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted…”
Full Text via HEAL-Link
Electronic eBook -
179Published 2018Table of Contents: “…Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning…”
Full Text via HEAL-Link
Electronic eBook -
180Published 2005Table of Contents: “…Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications…”
Full Text via HEAL-Link
Electronic eBook