1
Published 1998
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

2
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...-to-End Verifiable Postal Voting (Transcript of Discussion) -- Independent Computations for Safe Remote...

3
Published 2000
Springer Berlin Heidelberg
Table of Contents: ... Publishing -- Power and Permission in Security Systems -- Power and Permission in Computer Systems...

4
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... of Responsibility -- Abuse of Process -- A New Concept in Protocols: Verifiable Computational Delegation -- A New...

5
by Christianson, Bruce
Published 1998
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

6
Published 2017
Springer International Publishing
Subjects: ...Computer Communication Networks...

7
Published 2014
Springer International Publishing
Table of Contents: ... with the enemy on network management -- Collaborating with the enemy on network management (Transcript...

8
Published 2015
Springer International Publishing
Subjects: ...Computer Communication Networks...

9
Published 2014
Springer Berlin Heidelberg
Table of Contents: ... Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion...

10
Published 2010
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

11
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Computing Devices --...

12
Published 2011
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

13
Published 2018
Springer International Publishing
Table of Contents: ... for link key updates in wireless sensor Networks -- Entropy crowdsourcing - protocols for link key updates...

14
Published 2001
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

15
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We...

16
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...) -- Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) -- Pseudonymity in the Light...

17
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... of Presence -- Non-repudiation and the Metaphysics of Presence -- Understanding Why Some Network Protocols...

18
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...Keynote Address: Mobile Computing versus Immobile Security -- Experiences of Mobile IP Security...

19
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized...

20
Published 2020
Springer International Publishing
Subjects: ...Computer Communication Networks...