Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
защита
Связанные издания:
Providing Tractable Security Analyses in HOL
Public Key Cryptography
Question-and-Answer Passwords: An Empirical Evaluation
Recent Advances in Instrusion Detection: Proc./4th International Symposium, RAID 2001, Davis,CA,USA,October 2001
Recent Advances in Intrusion Detection: Proc./13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 2010
Recent Advances in Intrusion Detection: Proc./5th Intern. Symp., RAID 2002, Zurich, Switzerland, October 2002
Recent Advances in Intrusion Detection: Proc./6th Intern. Symp., RAID 2003, Pittsburgh, PA, USA, September 2003
Recent Advances in Intrusion Detection: Proc./Third Intern. Workshop, RAID 2000, Toulouse, France, October 2000
Recent Advances in Intrusion Detection: Revised Papers/8th International Symposium, RAID 2005. Seattle, WA, USA, September 2005
Redundant rights in protection systems
Reference Model for Data Management Security and Privacy
Reflections on MOPs, Components, and Java Security
Reliable Software Technologies - Ada-Europe 2009: Proc./14th Ada-Europe International Conference, Brest, France, June 2009
Replacing Passive Tasks with Ada 9X Protected Records
Research in Attacks, Intrusions, and Defenses: Proc./18th International Symposium, RAID 2015, Kyoto, Japan, November 2015
Role-Based Security: Pros, Cons and Some Research Directions
Runtime Verification: Proc./First International Conference, RV 2010, St.Julians, Malta, November 2010
Safe and Secure Execution Mechanisms for Mobile Objects
SAMSON, Security Management in a Health Care Scenario
Sanitisation as a Constraint on Multilevel Secure Relational Databases
Scalability of Networks and Services: Proc./Third International Conference AIMS 2009. Enschede, The Netherlands, June/July 2009
Secrecy-Preserving Refinement
Secret-Key Exchange with Authentication
Secure Communication in Distributed Ada
Secure Communications in ATM Networks
Secure Information Flow and CPS
Secure Interoperability of Trusted Database Management Systems
Secure Network Access Using Multiple Applications of AT&T s Smart Card
Securing XML Documents
Security and Communication in Mobile Object Systems
Security as an Add-On Quality in Persistent Object Systems
Security Clauses in the Writing and Analysis of Standards
Security Constraint Processing in Multilevel Secure AMAC Schemata
Security-Control Methods for Statistical Databases: A Comparative Study
Security Enhanced Direct Store Delivery System
Security in Electronic Messaging Systems
Security in Use and Management of VPN - a Banking Scenario
Security Mechanism of Privacy Enhanced Shared File System Suitable for Mobile Access
Security Problems and Countermeasures in the Current Internet
Security Services for Telecommunications Users
Security Services in the OSI Reference Model
Security Target and Test Purposes for EDIFACT
Security through Type Analysis
Security versus Performance Requirements in Data Communication Systems
Security without Identification: Transaction Systems to Make Big Brother Obsolete
SEER: Security Enhanced Entity-Relationship Model for Secure Relational Databases
Semantics and Program Analysis of Computationally Secure Information Flow
SEMPER - Secure Electronic Marketplace for Europe
Sensitive security points in PC microcomputers
Separating Key Management from File System Security
« первая
‹ предыдущая
…
2
3
4
5
6
7
8
9
10
…
следующая ›
последняя »