X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (41) 41
Journal Article (15) 15
Book Chapter (7) 7
Government Document (3) 3
Book / eBook (2) 2
Magazine Article (2) 2
Dissertation (1) 1
Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
hardware (9) 9
logic design (7) 7
very large scale integration (7) 7
computer science (6) 6
computer science, hardware & architecture (6) 6
design automation (6) 6
access control (5) 5
authentication (5) 5
circuit synthesis (5) 5
computer science, theory & methods (5) 5
design methodology (5) 5
logic (5) 5
adders (4) 4
arithmetic (4) 4
computer science, software engineering (4) 4
design engineering (4) 4
formal verification (4) 4
protocols (4) 4
trust (4) 4
calculus (3) 3
carbon capture and storage (3) 3
computer communication networks (3) 3
computer science, information systems (3) 3
computer security (3) 3
formale logik (3) 3
mathematische logik (3) 3
security (3) 3
studies (3) 3
algebra (2) 2
algorithms (2) 2
application software (2) 2
assurance (2) 2
authorization (2) 2
automatisierung (2) 2
boolean functions (2) 2
circuit simulation (2) 2
circuits (2) 2
computer applications (2) 2
computer science education (2) 2
computers (2) 2
data encryption (2) 2
data processing security (2) 2
data structures (2) 2
delegation (2) 2
digital systems (2) 2
digitale arithmetik (2) 2
discrete event simulation (2) 2
engineering (2) 2
formal specifications (2) 2
formale spezifikation (2) 2
formale sprache (2) 2
functional programming (2) 2
hardware design languages (2) 2
information systems (2) 2
internet (2) 2
internet of things (2) 2
logic arrays (2) 2
logic programming (2) 2
management of computing and information systems (2) 2
mathematischer beweis (2) 2
modal logic (2) 2
pe61102f (2) 2
rechnerunterstuetzter schaltungsentwurf (2) 2
rechnerunterstützter schaltungsentwurf (2) 2
retail payment systems (2) 2
seguridad informática (2) 2
specification languages (2) 2
spezifikationssprache (2) 2
standardization (2) 2
synthetic aperture sonar (2) 2
systems design (2) 2
systems engineering and theory (2) 2
testing (2) 2
voltage control (2) 2
access-control logic (1) 1
access‐control logic (1) 1
algorithm analysis and problem complexity (1) 1
algorithm design and analysis (1) 1
analytical models (1) 1
architecture (1) 1
arithmetik (1) 1
assessment of student learning (1) 1
automatic logic units (1) 1
automotive engineering (1) 1
binary decision diagrams (1) 1
books (1) 1
boole-algebra (1) 1
business (1) 1
business information systems (1) 1
business/management science, general (1) 1
categories (1) 1
cellular communications (1) 1
cellular phones (1) 1
certificate (1) 1
certified security by design (1) 1
clocks (1) 1
combinatorics (1) 1
computational modeling (1) 1
computer aided software engineering (1) 1
computer communications (1) 1
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2011, Chapman & Hall/CRC cryptography and network security, ISBN 9781584888628, xxi, 322
Book
2007, AD-a463 614.
The development of the Handheld Evidence Recovery Operator (HERO) has created a new paradigm for extracting evidence from portable devices without modifying... 
algorithms | personal data assistants | hand held | cellular communications | portable equipment | cellular phones | vulnerability | storage | pe61102f | user needs | external storage mediums | digital systems | radiotelephones | pagers | hero(handheld evidence recovery operator) | data acquisition | information systems | wuafrl23110002 | digital computers | internet | architecture
Government Document
Computer Networks, ISSN 1389-1286, 07/2014, Volume 67, pp. 235 - 251
An interoperable credential system allows users to reference a single asymmetric key pair to logon to multiple web sites and digitally sign transactions.... 
Authorization | Protocols | Wholesale banking | Trust | Authentication | Certificate | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Liability (Law) | Interoperability | Studies | Mobile commerce | Liability | Scalability | Security management | Public Key Infrastructure
Journal Article
2016, 1, ISBN 1119193869, 520
<p><b>Presents an Cyber-Assurance approach to the Internet of Things (IoT)</b></p> <p>This book discusses the cyber-assurance... 
Computing and Processing | Security measures | Internet | Internet of things
eBook
IEEE Security & Privacy, ISSN 1540-7993, 11/2012, Volume 10, Issue 6, pp. 74 - 77
What would it take for undergraduate computer engineering and computer science programs to routinely produce graduates who can design computer systems that are... 
Education courses | higher-order logic | HOL | Programming | Engineering education | assurance | computer security | Quality assurance | ConOps | theorem provers | Haskell | access control | Computer science education | Functional programming | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
STAR, ISSN 1548-8837, 04/2007, Volume 45, Issue 7
The development of the Handheld Evidence Recovery Operator (HERO) has created a new paradigm for extracting evidence from portable devices without modifying... 
Journal Article
1998, AD-a349 807.
The increased use of networked and distributed computing makes security a major concern. The capability to verify that a system meets its security requirements... 
wide area networks | computer communications | electronic mail | cryptography | data processing security | local area networks | secure communications | pe61102f | computer logic | pem(privacy enhanced mail) | information exchange | computer applications | wuafrl2304ftp1 | distributed data processing | message processing
Government Document
2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 10/2015, pp. 68 - 74
Testing and verification of healthcare information systems is a challenging and important issue since faults in these critical systems may lead to loss of... 
Electrocardiography | Sensors | Security | MATLAB | Medical services | Testing | Health care | State of the art | Formal method | Conferences | Simulation | Categories | Electronics | Information systems
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2003, Volume 2776, pp. 32 - 46
Access control - determining which requests for services should be honored or not - is particularly difficult in networked systems. Assuring that... 
AUTHENTICATION | SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
Computer, ISSN 0018-9162, 12/1998, Volume 31, Issue 12, pp. 25 - 30
Journal Article
2005, Lecture Notes in Computer Science, ISBN 9783540291138, Volume 3685, 15
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority,... 
Data Encryption | Computer Science | Computers and Society | Management of Computing and Information Systems | Computer Communication Networks | Algorithm Analysis and Problem Complexity | Operating Systems | DISTRIBUTED SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS
Book Chapter
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, 2003, Volume 125, pp. 179 - 196
Conference Proceeding
Communications in Computer and Information Science, ISSN 1865-0929, 2013, Volume 374, Issue II, pp. 99 - 114
Conference Proceeding
Computer Journal, ISSN 0010-4620, 2002, Volume 45, Issue 1, pp. 46 - 54
Establishing the security of a system is an intricate problem with subtle nuances: it requires a careful examination of the underlying assumptions,... 
COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | AUTHENTICATION
Journal Article
2010, Lecture Notes in Computer Science, ISBN 9783642147050, Volume 6258
Intelligent systems often operate in a blend of cyberspace and physical space. Cyberspace operations—planning, actions, and effects in realms where signals... 
Computer Communication Networks | Computer Science | Access control | Concept of operations | Policy | Logic
Book Chapter
1998, AD-a484 703.
Computer security can be used as a vehicle to achieve accreditation goals for computer science and engineering programs, while at the same time engaging... 
skills | graduates | policies | students | data processing security | information assurance | engineering | courses(education) | computers
Government Document
2010, Lecture Notes in Computer Science, ISBN 9783642147050, Volume 6258
Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional... 
Computer Communication Networks | Computer Science | Authorization | Protocols | Logic | Trust | Authentication
Book Chapter
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 1999, Volume 1708, pp. 758 - 775
To construct a highly-assured implementation of secure communication channels we must have dear definitions of the security services, the channels, and under... 
AUTHENTICATION | COMPUTER SCIENCE, THEORY & METHODS
Conference Proceeding
STAR, ISSN 1548-8837, 07/2000, Volume 38
Mature engineering fields have methods of construction that have high likelihoods of success, and that guarantee the proper functioning of systems, even within... 
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.