by
Lee, Wenke. editor.
Format:
Electronic Resources
Excerpt:
-- Towards Sound Detection of Virtual Machines -- Botnets and Proactive System Defense -- Detecting Botnet
by
Vadhan, Salil P. editor.
Format:
Electronic Resources
Excerpt:
Computationally Sound Protocols Revisited -- Lower Bounds for Non-interactive Zero-Knowledge -- Perfect NIZK with
View Other Search Results
by
Gollmann, Dieter. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment
by
Caballero, Juan. editor.
Format:
Electronic Resources
Excerpt:
Security Testing beyond Functional Tests -- Progress-Sensitive Security for SPARK -- Sound and
by
Baek, Joonsang. editor.
Format:
Electronic Resources
Excerpt:
-- Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups -- On the Equivalence of
by
Lai, Xuejia. editor.
Format:
Electronic Resources
Excerpt:
Selectively Convertible Undeniable Signature Schemes -- Simulation-Sound NIZK Proofs for a Practical Language
by
Kävrestad, Joakim. author.
Format:
Electronic Resources
Excerpt:
is, what it can do, and also what it can’t. A particular focus is presented on establishing sound
by
Freivalds, Rūsiņš Mārtiņš. editor.
Format:
Electronic Resources
Excerpt:
-- Application of Multiple Sound Representations in Multipitch Estimation Using Shift-Invariant Probabilistic
by
Yoshiura, Hiroshi. editor.
Format:
Electronic Resources
Excerpt:
Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability -- Sound Computational
by
Feng, Dengguo. editor.
Format:
Electronic Resources
Excerpt:
-- Zero-Knowledge and Secure Computations -- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof
by
Kinney, Steven L.
Format:
Electronic Resources
Excerpt:
embedded designers * Provides a sound foundation on the TPM, helping designers take advantage of hardware
Limit Search Results
Narrowed by: