1
by Calcote, Lee, Butcher, Zack
Published 2020
O'Reilly Media

2
by Rountree, Derrick
Published 2013
Syngress Media Inc.
Table of Contents: ... -- chapter 4. Secure remote access -- chapter 5. Internet connection security -- chapter 6. Network...

3
by Waguespack, Leslie J.
Published 2019
Springer International Publishing
Table of Contents: ... of Construction -- Security Design Quality Named and Framed though TST Choice Property Clusters -- Educating...

4
Published 2020
Springer International Publishing
Table of Contents: ...: Counteracting Eviction-Based Cache Side-Channel Attacks through Indirect Eviction -- Connection Security...

5
by Asselin, Stephane
Published 2014
VMware Press

6
Published 2019
Springer International Publishing
Table of Contents: ... Statistical Model Checking of UAV Flight plan -- Only Connect, Securely -- Output-sensitive Information Flow...

7
Published 2014
Springer Berlin Heidelberg
Table of Contents: ... Information -- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case -- Constructing...

8
by Warner, Brian
Published 1995
Springer Netherlands
Table of Contents: ...Synopsis of the Construction -- Security Measures -- Quality Control -- The Chases -- Instrument...

9
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers...

10
Published 2008
Syngress
Table of Contents: ... Traffic Filtering; Firewall Rules; Connection Security Rules; Firewall Profiles...

11
Published 2021
Springer International Publishing
Table of Contents: ... Problem -- Anonymous IBE from PEKS : A Generic Construction -- Secure Computation of Shared Secrets...

12
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... -- Signcryption -- Two Proxy Signcryption Schemes from Bilinear Pairings -- Constructing Secure Warrant-Based...

13
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag...

14
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- On Establishing and Fixing a Parallel Session Attack in a Security Protocol -- Constructing Security Protocol...

15
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications...

16
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... of SHA-0 -- Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions -- Secure...

17
Published 2006
Springer Berlin Heidelberg
... for Construction, Security & Defence Robots, Cleaning Robots, Autonomous Underwater Vehicles and Autonomous Flying...

18
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...

19
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES --...

20
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key Cryptography I...