Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
защита
Связанные издания:
16 вариантов русской за иты
4th ECOOP Workshop on Mobility: Secure Internet Mobile Computations
A Brief Essay on Capabilities
A Broader Approach to Personalization
A Calculus for Secure Channel Establishment in Open Networks
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace
A Consideration of the Modes of Operation for Secure Systems
A Critical Look at Functional Specifications
A Cryptographic Mechanism for Object-Instance-based Authorization in Object-Oriented Database Systems
A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases
Actor-Centric Modeling of User Rights
Adaptive and Natural Computing Algorithms: Revised Selected Papers/ 9th International Conference, ICANNGA 2009, Kuopio, Finland, April 2009
A Distributed System Security Architecture: Applying the Transport Layer Security Protocol
Advances in Cryptology - AUSCRYPT 92: Proc./Workshop on the Theory and Application of Cryptographic Techniques. Gold Coast, Queensland, Australia, December 1992
Advances in Cryptology - CRYPTO 92: Proc./12th Annual Intern. Cryptology Conf. Santa Barbara, California, USA, August 1992
Advances in Databases and Information Systems: Proc./14th East European Conference, ADBIS 2010, Novi Sad, Serbia, September 2010
Advances in Practical Applications of Scalable Multi-agent Systems: The PAAMS Collection: Proc./14th International Conference, PAAMS 2016, Sevilla, Spain, June 2016
AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks
A Formal Framework for Authentication
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
A Graduate Course in Computing Security Technology
A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme
A High Resolution Event Timer Ada Package for DOS Environments
A High-Speed DES Implementation for Network Applications
Algebraic Coding: First French-Israeli Workshop. Paris, France, July 1993
Algebraic operation on encrypted relation databases
A Logical Account of NGSCB
A Logic for Reasoning About Security
A Look at Multipolicy Research Today and Some Proposed Directions for Tomorrow
A Matching Algorithm for Measuring the Structural Similarity between an XML Document and a DTD and Its Applications
A Mathematical Framework to Implement Statistical Databases
A Model for the Protection of Reusable Software
A Modified Random Perturbation Method for Database Security
An Abstract Interpretation-Based Framework for Software Watermarking
An Access Control Mechanism for Object-Oriented Database Systems
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning
Analysis of Modern Authentication Facilitied for Information Security Systems
An Authorization Mechanism for Unix-Based Cooperative Environments
An Engineering Approach to Secure System Analysis, Design, and Integration
A New Access Control Method Using Prime Factorisation
An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks
An Intrusion Detection System for Aglets
An Object-Oriented Model of Access Control based on Role
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems
A Note on the Use of Timestamps as Nonces
Antivirus Technology Offers New Cures
Applications of Evolutionary Computation: Proc./18th European Conference, EvoApplications 2015. Copenhagen, Denmark, April 2015
Approximation, Randomixation, and Combinatorial Optimization. Algorithms and Techniques: Proc./12th IW, APPROX 2009 and 13th IW, RANDOM 2009, Berkeley, CA, USA, August 2009
Architecting Critical Systems: Proc./First International Symposium, ISARCS 2010, Prague, Czech Republic, June 2010
Architectural Support for Single Address Space Operating Systems
1
2
3
4
5
6
7
8
9
…
следующая ›
последняя »