2781
Published 1990
Springer New York
Table of Contents: ... Computation -- Security Concerns -- AnAbstract Theory of Computer Viruses -- Abuses in Cryptography and How...

2782
by Duplys, Paul, Schmitz, Roland
Published 2023
Packt Publishing Ltd.
Table of Contents: ... example -- The one-time pad -- Computational security -- Asymptotic approach and efficient computation...

2783
Published 2005
Springer US
Table of Contents: ...-value problems -- Computer Security and Safety -- Fast Computation of Approximation Tables...

2784
Published 2001
Springer Berlin Heidelberg
... tutorials. RSA Conference 2001 is expected to continue the tradition and remain the largest computer...

2785
by Spivey, Ben, Echeverria, Joey
Published 2015
O'Reilly Media
... in Hadoop, and organize them according to common computer security concepts. You'll also get real-world...

2786
Published 2006
Springer US

2787
Published 2023
Springer Nature Switzerland
Table of Contents: ...Peer Online Training (POT) as Learning Activity in Computer Security Audit and Risks Management...

2788
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Typed Lambda Calculus -- A Type System for Computationally Secure Information Flow -- Approximation...

2789
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation...

2790
Published 2024
Springer Nature Switzerland
Table of Contents: ... Modeling with Simultaneous EEG-SEEG Data. -- Recommendation and Social Computing. -- Secure and Negotiate...

2791
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... for Constrained Hardware -- Key Management -- A Distributed and Computationally Secure Key Distribution Scheme...

2792
by Russel, Charlie
Published 2006
Microsoft Press
Table of Contents: ...Securing Client ComputersSecuring Wireless Networks; Securing Internet Firewalls; Summary; Part II...

2793
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... for RFIDs Proactive Information Security Within Computational Security -- Fault Masking in Tri-redundant...

2794
Published 2015
Springer India
Table of Contents: ... Exponentiation -- Chapter 9. Computationally Secure Robust Multi-Secret Sharing for General Access Structure...

2795
Published 2018
Springer International Publishing
Table of Contents: ... -- An Implementation of Content-Based Pub/Sub System via Stream Computation -- Security Message Broadcast Mechanism...

2796
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... -- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks --...

2797
Published 2016
Springer International Publishing
Table of Contents: ... -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records...

2798
Published 2007
Springer US
Table of Contents: ...Remote Virtual Information Assurance Network -- Certifying the Computer Security Professional Using...

2799
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Invited Papers -- Methodologies for Automated Telephone Answering -- Anomaly Detection in Computer...

2800
Published 2008
Springer US
Table of Contents: ...Using Virtualization to Create and Deploy Computer Security Lab Exercises -- DigForNet: Digital...