-
2101
-
2102
-
2103
-
2104
-
2105Published 2005Table of Contents: “… points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation…”
Full Text via HEAL-Link
Electronic eBook -
2106Published 2002Table of Contents: “… Public Key Cryptosystem for Constrained Hardware -- Key Management -- A Distributed and Computationally…”
Full Text via HEAL-Link
Electronic eBook -
2107Published 2005Table of Contents: “… for Computationally Secure Information Flow -- Approximation Algorithms -- Algorithms for Graphs Embeddable with Few…”
Full Text via HEAL-Link
Electronic eBook -
2108Published 2009Table of Contents: “…-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation…”
Full Text via HEAL-Link
Electronic eBook -
2109
-
2110
-
2111
-
2112Published 2006Table of Contents: “… Drivers -- Secure Communication for RFIDs Proactive Information Security Within Computational Security…”
Full Text via HEAL-Link
Electronic eBook -
2113Published 2018Table of Contents: “…-Based Pub/Sub System via Stream Computation -- Security Message Broadcast Mechanism Research…”
Full Text via HEAL-Link
Electronic eBook -
2114Published 2015Table of Contents: “… Exponentiation -- Chapter 9. Computationally Secure Robust Multi-Secret Sharing for General Access Structure…”
Full Text via HEAL-Link
Electronic eBook -
2115Published 2005Table of Contents: “…Invited Papers -- Methodologies for Automated Telephone Answering -- Anomaly Detection in Computer…”
Full Text via HEAL-Link
Electronic eBook -
2116
-
2117Published 2015Table of Contents: “…-Qur’an, Al-Hadith and Jawi Scripts for Computer Security -- Chapter 2: Is an Islamic Scientific Study…”
Full Text via HEAL-Link
Electronic eBook -
2118by Rhee, Man YoungTable of Contents: “… Threats; 2.13.1 Phishing; 2.13.2 SNS Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit…”
Published 2013
Full Text via HEAL-Link
eBook -
2119Published 2009Table of Contents: “… Pages by Inductive Learning -- The Handicap Principle for Trust in Computer Security, the Semantic Web…”
Full Text via HEAL-Link
Electronic eBook -
2120