Search alternatives:
"secures" » "secure", "secured", "securely"

1
Published 1999
Springer US
Table of Contents: ... to manage data communication security -- 4. The Future of Australian & New Zealand Security Standard AS/NZS...

2
Published 1990
Springer London
Table of Contents: ...I: Invited Presentations -- Capabilities and Security -- Persistent Languages and Architectures...

4
Published 1997
Springer Berlin Heidelberg
Table of Contents: ... sequences and elliptic curves -- Efficient and provable security amplifications -- A comparison of RSA...

5
by Longley, Dennis, Shain, Michael, Caelli, William
Published 1992
Palgrave Macmillan
Subjects: ...Data and Information Security...

6
Published 1997
Palgrave Macmillan UK
.... They cover a broad range of subjects: new threats to Europe's security, the advantages and disadvantages...

7
by Pick, Otto, Critchley, Julian
Published 1974
Macmillan Education UK

8
by Chalmers, Malcolm
Published 2000
Palgrave Macmillan UK
...Sharing Security is a unique and comprehensive study of a key yet often neglected feature of modern...

10
by Fischer-Hübner, Simone
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Privacy in the Global Information Society -- IT-Security -- Privacy-Enhancing Technologies -- A...

11
Published 2000
Springer Berlin Heidelberg
Table of Contents: ...Keynote Address: The Changing Environment -- Composing Security Properties -- Auditing against...

12 Table of Contents: ...1 The Basics of Cryptography and Security -- 2 Using the .NET Cryptography Classes -- 3 XML...

13
Published 2004
Gabler Verlag

15
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...Biometrics -- Biometric Authentication in Infrastructure Security -- Denial of Access in Biometrics...

16
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers...

17
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... Representations and Bounds -- Approximate Power Roots in ?m -- Securing Elliptic Curve Point Multiplication...

18
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks...

19
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... -- Towards a Business Process-Driven Framework for Security Engineering with the UML -- Codes and Related...

20
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... in an Ethernet Network -- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks -- Securing DBMS...