Search alternatives:
springer finance » einer finance, merger finance, pardner finance
springer science » stronger science, spring resilience, river science
springer wrangle » springer springe
wrangle business » oracle business, change business, france business
using model » ising model, using mobile

1
Published 2015
Springer International Publishing
Table of Contents: ... SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique...

2
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...-RBAC: A Usage Constrained Role-Based Access Control Model -- (Virtually) Free Randomization Techniques...

3
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... -- The Consistency of an Access Control List -- Knowledge-Based Modeling and Simulation of Network Access Control...

4
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Attackers Using Decoy Documents -- MULAN: Multi-Level Adaptive Network Filter -- Automated Classification...

5
Published 2014
Springer International Publishing
Table of Contents: ... Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless...

6
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Parameter Choicefor Elliptic Curve Cryptosystems Using Isogeny -- On the Security of Multiple Encryption...

7
Published 2021
Springer International Publishing
Table of Contents: ...Applied Cryptography -- An Aggregate Signature with Pre-Communication in the Plain Public Key Model...

8
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems...

9
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... Schemes -- A Role-Based Model for Access Control in Database Federations -- A Useful Intrusion Detection...

10
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... – II -- Efficient Isolation of Trusted Subsystems in Embedded Systems -- Enhancing Host Security Using...

11
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Capacity Estimation -- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov...

12
Published 2023
Springer Nature Switzerland
Table of Contents: ...Using Model Optimization as Countermeasure against Model Recovery Attacks -- AIoTS – Artificial...

13
Published 2022
Springer International Publishing
Table of Contents: ... Vulnerability of Object Detection Models via Adver[1]sarial Distillation -- Vulnerability Detection for Smart...

14
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Using Fault Tree Analysis -- An Identity-Based Grid Security Infrastructure Model -- Data Security...

15
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords...

16
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Using Data Field to Analyze Network Intrusions -- Adversarial Organization Modeling for Network Attack...

17
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Protocols for Two-Party Authenticated Key Exchange -- Password Authenticated Key Exchange Using Quadratic...

18
Published 2020
Springer International Publishing
Table of Contents: ... Lateral Movement Detection Using Graph Embedding --...