Trusted Information
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow...
EAN: 9781475775365
Foundations and Practice of Security
This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations...
EAN: 9783319053011
Information Security Applications
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on...
EAN: 9783319051482
Pairing-Based Cryptography -- Pairing 2013
This book constitutes the refereed proceedings of the 6th International Conference on...
EAN: 9783319048727
Topics in Cryptology -- CT-RSA 2014
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference...
EAN: 9783319048512
Forensic Computing
The second edition of this successful book shows how the contents of computer systems can be...
EAN: 9781849965965
Automated Security Management
In this contributed volume, leading international researchers explore configuration modeling and...
EAN: 9783319014326
Information Security Management & Small Systems Security
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems...
EAN: 9781475754834
Availability, Reliability, and Security in Information Systems and HCI
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International...
EAN: 9783642405105
Financial Cryptography and Data Security
EAN: 9783642398834
Advances in Cryptology – CRYPTO 2013
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd...
EAN: 9783642400834
Advances in Cryptology – CRYPTO 2013
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd...
EAN: 9783642400407
Data and Applications Security and Privacy XXVII
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference...
EAN: 9783642392559
Black-Box Models of Computation in Cryptology
Generic group algorithms solve computational problems defined over algebraic groups without...
EAN: 9783834819895
TErrestrial Trunked RAdio - TETRA
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security...
EAN: 9783642090295
Security, Privacy, and Trust in Modern Data Management
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are...
EAN: 9783540698609
Algebraic Cryptanalysis
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It...
EAN: 9781489984500
Handbook of Multibiometrics
Multibiometric systems are expected to meet the stringent performance requirements imposed by...
EAN: 9781441935472
10 Don'ts on Your Digital Devices
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to...
EAN: 9781484203682
Primality Testing and Integer Factorization in Public-Key Cryptography
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic...
EAN: 9781441945860
Biometric User Authentication for IT Security
EAN: 9781441938732
Advances in Information Processing and Protection
The Computer Science is relatively new field which is developing very fast not only because due...
EAN: 9781441944573
Cryptographic Engineering
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students...
EAN: 9781441944177