2
Published 1994
Springer Berlin Heidelberg
Table of Contents: ... systems -- Liability and computer security: Nine principles -- Implementing secure dependencies over a...

3
by Snekkenes, Einar
Published 2003
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

4
Published 2003
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

5
by Cuppens, Frederic
Published 2000
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

6
by Gollmann, Dieter
Published 2002
Springer-Verlag Berlin Heidelberg
Subjects: ...Computer Communication Networks...

7
by Samarati, Pierangela
Published 2004
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

8
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality...

9
Published 2017
Springer International Publishing
Subjects: ...Computers and Society...

10
Published 2017
Springer International Publishing
Subjects: ...Computers and Society...

11
by Quisquater, Jean-Jacques
Published 1998
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

12
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching...

13
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented...

14
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A...

15
Published 1998
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

16
Published 2000
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

17
Published 2023
Springer Nature Singapore
Subjects: ...Computer networks / Security measures...

19
Published 2010
Springer US
Subjects: ...Computer Communication Networks...

20
Published 2015
Springer International Publishing
Table of Contents: ... on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users...