1
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling...

2
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... -- Encapsulating Rules of Prudent Security Engineering -- A Multi-OS Approach to Trusted Computer Systems -- A...

3
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... -- From Security Protocols to Systems Security -- FromSecurity Protocols to Systems Security -- Biometrics...

4
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... of Discussion) -- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System -- Safe...

5
Published 2011
Springer Berlin Heidelberg
Subjects: ...Operating Systems...

6
by Christianson, Bruce
Published 2004
Springer Berlin Heidelberg
Subjects: ...Operating systems (Computers)...

7
by Christianson, Bruce
Published 2002
Springer-Verlag Berlin Heidelberg
Subjects: ...Operating systems (Computers)...

8
Published 2010
Springer Berlin Heidelberg
Subjects: ...Computer and Information Systems Applications...

9
Published 2011
Springer Berlin Heidelberg
Subjects: ...Computer and Information Systems Applications...

10
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Tracking System -- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System...

11
Published 2000
Springer Berlin Heidelberg
Table of Contents: ... Publishing -- Power and Permission in Security Systems -- Power and Permission in Computer Systems...

12
Published 2014
Springer International Publishing
Table of Contents: ... of Discussion) -- Bootstrapping Adoption of the Pico Password Replacement System -- Bootstrapping adoption...

13
Published 2014
Springer Berlin Heidelberg
Table of Contents: ... Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended...

14
Published 2013
Springer Berlin Heidelberg
Subjects: ...Computer and Information Systems Applications...

15
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... Billing System -- Broadening the Scope of Fault Tolerance within Secure Services -- Broadening the Scope...

16
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Countering Automated Exploits with System Security CAPTCHAS -- Countering Automated Exploits...