321
Kuo, C.-C. Jay.
2012
Table of Contents:
“... of Cryptographic Libraries on Android Smartphones -- Secure Middleware Patterns -- Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction -- Towards Effective Algorithms for Intelligent Defense Systems....”2012
Full text
322
Manulis, Mark.
2012
Table of Contents:
“...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....”2012
Full text
323
324
325
326
327
328
329
Aho, Alfred V.
2011
Table of Contents:
“... -- High Performance Computing and Communication (HPCC) -- Programming for Distributed Computing -- Databases -- Computer Security: Cryptographic Methods, Public Key Cryptography, RSA, ECC -- Complexity Theory -- Multi-variate (Parameterized) Complexity...”2011
Full text
330
331
334
335
336
337
338
339
340