Search alternatives:
"secularity" » "regularity", "secularism"
"peculiarity" » "peculiarly", "peculiarities"

1
by Cachin, Christian, Guerraoui, Rachid, Rodrigues, Luís
Published 2011
Springer Berlin Heidelberg
... challenge when developing reliable and secure distributed programs is to support the cooperation...

2
Published 2018
Springer International Publishing
Table of Contents: ... Security Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean...

3
by Bär, Tobias
Published 2022
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

4
Published 2018
Springer International Publishing
Subjects: ...Data and Information Security...

5
Published 2020
Springer International Publishing
Table of Contents: ... Consensus Mechanisms and Their Applications in IoT: A Literature Survey -- Towards A secure Communication...

6
by Godunov, S.K., Antonov, A.G., Kiriljuk, O.P., Kostin, V.I.
Published 1993
Springer Netherlands
Table of Contents: ... Matrices -- 4 Sturm Sequences of Tridiagonal Matrices -- 5 Peculiarities of Computer Computations...

7
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... -- Hardware Security -- Privacy and Security -- Application Security...

8
Published 2015
Springer International Publishing
Table of Contents: ...Trust, security and privacy for Big Data -- Trust, security and privacy for emerging applications...

9
Published 1985
Springer Berlin Heidelberg
Table of Contents: ... connected with peculiar curves -- Iteration and analytic classification of local diffeomorphisms...

10
Published 2017
Springer International Publishing
Table of Contents: ... -- Applications of parallel and distributed computing -- Service dependability and security in distributed...

11
Published 2018
Springer International Publishing
Table of Contents: ...Graph Theory -- Network Flow and Security -- Combinatorial Optimization -- Computational Geometry...

12
Published 2018
Springer International Publishing
Table of Contents: ... Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing...

13
Published 2018
Springer International Publishing
Table of Contents: ... Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing...

14
Published 2018
Springer International Publishing
Table of Contents: ... Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing...

15
Published 2018
Springer International Publishing
Table of Contents: ... Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing...

16
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Methods -- System and Information Security -- Intelligent Control -- Wireless Sensor Network -- Scheduling...

17
Published 2014
Springer International Publishing
Table of Contents: ... in ITS 2014 -- Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014...

18
by Kneusel, Ronald T.
Published 2018
Springer International Publishing
Table of Contents: ... Cryptographically Secure Pseudorandom Number Generators -- 7 Other Random Sequences....

19
Published 2015
Springer International Publishing
Table of Contents: ... theory -- Cryptography, reliability and security -- Database theory, computational biology...

20
Published 2015
Springer International Publishing
Table of Contents: ... and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO...