Showing 2,101 - 2,120 results of 2,153 for search '"computer security"', query time: 0.18s Refine Results
  1. 2101
  2. 2102
    Published 2009
    Full Text via HEAL-Link
    Electronic eBook
  3. 2103
  4. 2104
  5. 2105
    Published 2005
    Table of Contents: “… points in 3D potential boundary-value problems -- Computer Security and Safety -- Fast Computation…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 2106
    Published 2002
    Table of Contents: “… Public Key Cryptosystem for Constrained Hardware -- Key Management -- A Distributed and Computationally…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 2107
    Published 2005
    Table of Contents: “… for Computationally Secure Information Flow -- Approximation Algorithms -- Algorithms for Graphs Embeddable with Few…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 2108
    Published 2009
    Table of Contents: “…-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 2109
  10. 2110
  11. 2111
  12. 2112
    Published 2006
    Table of Contents: “… Drivers -- Secure Communication for RFIDs Proactive Information Security Within Computational Security…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 2113
    Published 2018
    Table of Contents: “…-Based Pub/Sub System via Stream Computation -- Security Message Broadcast Mechanism Research…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 2114
    Published 2015
    Table of Contents: “… Exponentiation -- Chapter 9. Computationally Secure Robust Multi-Secret Sharing for General Access Structure…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 2115
    Published 2005
    Table of Contents: “…Invited Papers -- Methodologies for Automated Telephone Answering -- Anomaly Detection in Computer…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 2116
    Published 2024
  17. 2117
    Published 2015
    Table of Contents: “…-Qur’an, Al-Hadith and Jawi Scripts for Computer Security -- Chapter 2: Is an Islamic Scientific Study…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 2118
    by Rhee, Man Young
    Published 2013
    Table of Contents: “… Threats; 2.13.1 Phishing; 2.13.2 SNS Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit…”
    Full Text via HEAL-Link
    eBook
  19. 2119
    Published 2009
    Table of Contents: “… Pages by Inductive Learning -- The Handicap Principle for Trust in Computer Security, the Semantic Web…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 2120
Search Tools: RSS Feed Email Search