Showing 161 - 180 results of 891 for search 'Hardware security', query time: 0.12s Refine Results
  1. 161
    Published 2015
    Table of Contents: “… Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation -- Metric…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 162
    Published 2012
    Table of Contents: “… Detection -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Continual…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 163
    Published 2017
    Table of Contents: “… Delay Hybrid CSP -- Security -- Taming Message-passing Communication in Compositional Reasoning about…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 164
    Published 2004
    Table of Contents: “… for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 165
    Published 2014
    Table of Contents: “…COMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT…”
    Full Text via HEAL-Link
    eBook
  6. 166
    Published 2015
    Table of Contents: “… Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 167
    by Salomon, David
    Published 2010
    Table of Contents: “…Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 168
    Published 1999
    Table of Contents: “… as Specifications of Access Policies -- Security Properties of Typed Applets -- Concepts -- The Role of Trust…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 169
    Published 2006
    Table of Contents: “…Security Analysis and Attacks -- Security Weakness in Ren et al.’s Group Key Agreement Scheme Built…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 170
    Published 2007
    Table of Contents: “…Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 171
    Published 2010
    Table of Contents: “… on Cryptographic Hardware -- Security and Scalability of Remote Entrusting Protection -- Adaptive Security…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 172
    Published 2015
    Table of Contents: “… Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 173
    Published 2007
    Table of Contents: “… Machines in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 174
    Published 2007
    Table of Contents: “… -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 175
    Published 2012
    Table of Contents: “…Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 176
    Published 2008
    Table of Contents: “…New Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 177
    Published 1998
    Table of Contents: “…A review of the SESAME development -- The security of public key cryptosystems based on integer…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 178
    Published 2017
    Table of Contents: “… Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 179
    Published 2018
    Table of Contents: “…Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 180
    Published 2005
    Table of Contents: “…Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search