Yazar
Niu, Wenjia. editor.
Format:
Electronic Resources
Alıntı:
protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies
Yazar
Homma, Naofumi. editor.
Format:
Electronic Resources
Alıntı:
Side-Channel Attacks -- Java Cards -- Evaluation Tools -- Fault Attacks -- Countermeasures
View Other Search Results
Yazar
Chakraborty, Rajat Subhra. editor.
Format:
Electronic Resources
Alıntı:
Cryptographic building blocks -- Mini tutorial -- Attacks and countermeasures -- Tools and methods
Yazar
Peyrin, Thomas. editor.
Format:
Electronic Resources
Alıntı:
implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory
Yazar
Jakobsson, Markus. editor.
Format:
Electronic Resources
Alıntı:
and complementary tools to the currently deployed email security tools, with a focus on understanding
Yazar
Orman, Hilarie. author.
Format:
Electronic Resources
Alıntı:
it. Written by an expert in software security and computer tools, Encrypted Email: The History and
Yazar
Robshaw, Matthew. editor.
Format:
Electronic Resources
Alıntı:
techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis
Yazar
Robshaw, Matthew. editor.
Format:
Electronic Resources
Alıntı:
techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis
Yazar
Robshaw, Matthew. editor.
Format:
Electronic Resources
Alıntı:
techniques -- Spooky encryption -- IBE, ABE, and functional encryption -- Automated tools and synthesis
Yazar
Al-Shaer, Ehab. author.
Format:
Electronic Resources
Alıntı:
methodologies, techniques and tools for researchers as well as professionals to understand the challenges and
Yazar
Standaert, François-Xavier. editor.
Format:
Electronic Resources
Alıntı:
(tools) -- Simpler, Faster, and More Robust T-test Based Leakage Detection -- Design and implementation
Yazar
Felici, Massimo. editor.
Format:
Electronic Resources
Alıntı:
and Accountability Tools for Cloud Service Chains -- Privacy-Preserving Identity Management as a
Arama Sonuçlarını Sınırlandır
Daraltılmış: