Search alternatives:
operating » operation

1
Published 2000
Springer Berlin Heidelberg
Table of Contents: ... Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic...

2
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP...

3
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Sharing -- NGSCB: A Trusted Open System -- Cryptanalysis (I) -- The Biryukov-Demirci Attack on Reduced...

4
by Pieprzyk, Josef
Published 1999
Springer-Verlag Berlin Heidelberg
Subjects: ...Operating systems (Computers)...

5
by Varadharajan, Vijav
Published 1997
Springer Berlin Heidelberg
Subjects: ...Operating systems (Computers)...

6
Published 1997
Springer Berlin Heidelberg
Table of Contents: ... a denial of service protection base -- ProtectOS: Operating system and hardware support for small...

7
by Wang, Huaxiong
Published 2004
Springer Berlin Heidelberg
Subjects: ...Operating systems (Computers)...

8
by Pieprzyk, Josef, Sadeghiyan, Babak
Published 1993
Springer Berlin Heidelberg
Subjects: ...Operating Systems...

9
Published 1996
Springer Berlin Heidelberg
Table of Contents: ... network intrusion experiment -- Evidential reasoning in network intrusion detection systems -- A group...

10
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient...

11
by Pieprzyk, Josef, Hardjono, Thomas, Seberry, Jennifer
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... -- 10 Group-Oriented Cryptography -- 11 Key Establishment Protocols -- 12 Zero-Knowledge Proof Systems...

12
Published 1995
Springer Berlin Heidelberg
Table of Contents: ... insecure server -- The magic words are squeamish ossifrage -- Cryptanalysis of multiple modes of operation...