This book constitutes the proceedings of the 15th International Conference on Applied Cryptology ...
InhaltsangabeValuation of trust in open networks.- Security versus performance requirements in da...
InhaltsangabeAttacks on the HKM HFX cryptosystem.- Truncated differentials of SAFER.- On the we...
A completely up-to-date resource on computer securityAssuming no previous experience in t...
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insid...
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insid...
InhaltsangabeMotivations.- Why to adopt a security metric? A brief survey.- Service-oriented Assu...
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information S...
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop o...
InhaltsangabePrivacy-Preserving Speaker Authentication.- Differential Attacks on Reduced RIPEMD-1...
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems...
InhaltsangabeMotivations.- Why to adopt a security metric? A brief survey.- Service-oriented Assu...