Search

Your search keyword '"Digital security"' showing total 174 results

Search Constraints

Start Over You searched for: Descriptor "Digital security" Remove constraint Descriptor: "Digital security" Topic generalliterature_reference(e.g.,dictionaries,encyclopedias,glossaries) Remove constraint Topic: generalliterature_reference(e.g.,dictionaries,encyclopedias,glossaries)
174 results on '"Digital security"'

Search Results

1. Short Non-Malleable Codes from Related-Key Secure Block Ciphers

2. Column Parity Mixers

3. A Note on Distances between Probabilistic and Quantum distributions

4. EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread

5. Shorter Linear Straight-Line Programs for MDS Matrices

6. Hyper Normalisation and Conditioning for Discrete Probability Distributions

7. Optimal PRFs from Blockcipher Designs

8. A Recipe for State-and-Effect Triangles

9. Paschke Dilations

10. De verjaardagsparadox in de cryptografie

11. De vergoedbare schade bij de onrechtmatige verwerking van persoonsgegevens

12. Security on the Line: Modern Curve-based Cryptography

13. Privacy in Location-Based Services: An Interdisciplinary Approach

14. A Kochen-Specker System Has at Least 22 Vectors

16. Effectuses from Monads

17. A Type Theory for Probabilistic and Bayesian Reasoning

18. Three characterisations of the sequential product

19. Connecting tweakable and multi-key blockcipher security

21. Making Privacy By Design Concrete

22. Classical Control and Quantum Circuits in Enriched Category Theory

23. On the nature of real and perceived bias in the mainstream media

24. Lower and Upper Conditioning in Quantum Bayesian Theory

26. An Effect-theoretic Account of Lebesgue Integration

27. Unordered Tuples in Quantum Computation

28. QPEL: Quantum Program and Effect Language

29. Preface: RAC 2016 - Resource Aware Computing

30. Games for bisimulations and abstraction

31. Data optimizations for constraint automata

32. New techniques for trail bounds and application to differential trails in Keccak

33. Completing the Complete ECC Formulae with Countermeasures

35. Saved by Design?

37. Towards Practical, Precise and Parametric Energy Analysis of IT Controlled Systems

38. Categorical Duality in Probability and Quantum Foundations

39. Security and Privacy via Cryptography Having your cake and eating it too

41. Combine and conquer: Relating BIP and Reo

43. High-speed key encapsulation from NTRU

44. Efficient Length Doubling from Tweakable Block Ciphers

45. Semantic Reasoning in Zero Example Video Event Retrieval

46. Analysing energy consumption of systems controlled by software

47. Privacy in tijden van internet, sociale netwerken en big data

48. Picturing Indefinite Causal Structure

50. A Kochen-Specker system has at least 22 vectors (extended abstract)

Catalog

Books, media, physical & digital resources