1
0
0
(1 - 16 von 17
)
Advances in Cryptology – EUROCRYPT 2001: International Conference on...
books.google.de
Their scheme then allows the signer to sign with several different tag public keys to achieve partial blindness. It was proven that the same tag key could be used ...
Applied Cryptography and Network Security: 14th International...
books.google.de
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford,...
Java for ColdFusion Developers - Eben Hewitt - Google Books
books.google.de
Macromedia's new ColdFusion MX brings ColdFusion's proven ease of use and productivity to the scalable, standards-based Java technology architecture....
Servlets und JSPs von Kopf bis Fuß - Bryan Basham, Bert Bates, Kathy...
books.google.de
... getParent() intdoStartTag() void setPageContext(PageContext) void setParent(Tag) voidrelease() <<interface>> Tag public void doTag() throws JspException, ...
Gegenüberstellung von HTML-Dialekten zur Analyse und Konvertierung...
books.google.de
... public: WBool allowed( MyWString tag ); public: WBool canchanged( MyWString tag, MyWString &vorschlag ); private: WULong ShowQuestion( MyWString tag ...
Mastering Unity Scripting - Alan Thorn - Google Books
books.google.de
Mastering Unity Scripting is an advanced book intended for students, educators, and professionals familiar with the Unity basics as well as the basics of...
Programmieren mit Java - Reinhard Schiedermeier - Google Books
books.google.de
Schiedermeier stellt die Programmiersprache Java in der aktuellen Version 5.0 vor. DAs Buch behandelt die Grundlagen der Programmierung mit Java und befasst...
Visualizing Data: Exploring and Explaining Data with the Processing...
books.google.de
Enormous quantities of data go unused or underused today, simply because people can't visualize the quantities and relationships in it. Using a downloadable...
A Practical Guide to Data Structures and Algorithms using Java -...
books.google.de
Although traditional texts present isolated algorithms and data structures, they do not provide a unifying structure and offer little guidance on how to...
Computer and Information Security Handbook - Google Books
books.google.de
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy...
Engaging Learners with Complex Learning Difficulties and...
books.google.de
[Online at: http://barrycarpentereducation.com/tag/engagement/; accessed: ] Chapter6 Learning with. For instructions on creating graphs using CLDD ...
Feminist Cyberspaces: Pedagogies in Transition - Google Books
books.google.de
Feminist Cyberspaces: Pedagogies in Transition is a collection of essays exploring the ways in which new media technologies are being used in the feminist...
Java-Grundkurs für Wirtschaftsinformatiker: Die Grundlagen verstehen...
books.google.de
Auch die zweite Auflage dieser an Inhalten der Wirtschaftsinformatik orientierten Einfuhrung in die Programmierung mittels JAVA eignet sich gleichermassen als...
RESTful Java with JAX-RS - Bill Burke - Google Books
books.google.de
Learn how to design and develop distributed web services in Java using RESTful architectural principals and the JAX-RS specification in Java EE 6. With this...
RFID Systems: Research Trends and Challenges - Google Books
books.google.de
However, the ciphertext stored in a tag can be subverted if the attacker were to replace the tag's public key with his/her own public key. After that, the attacker ...
The Cardinal Cornerstone for MES Success: For Advanced Manufacturing...
books.google.de
Technical Problem or Adaptive Challenge? Before a design organization develops a new computer system to support a manufacturing process, strategists need to...
Verwandte Suchanfragen zu Tag Public-Engagement
Personen Vorname "Tag" (26960) Name "Public-Engagement" (1) |
sortiert nach Relevanz / Datum