Search alternatives:
"secularity" » "regularity", "secularism"
"peculiarity" » "peculiarly", "peculiarities"

1
Published 1999
Springer US
Table of Contents: ...I Invited Talks -- 1 E-Commerce Security: No Silver Bullet -- 2 Technical Enforcement...

2
Published 2014
Springer New York
Table of Contents: ...Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security...

3
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

4
Published 2016
Springer International Publishing
Table of Contents: ...Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec...

5
Published 2011
Springer US
... and Security brings the latest and most comprehensive coverage of the topic: Definitive information...

6
Published 2008
Springer US
Table of Contents: ... Structures for Outsourced Databases -- Towards Secure Data Outsourcing -- Managing and Querying Encrypted...

7
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast...

8
by Wang, Lingyu, Jajodia, Sushil, Singhal, Anoop
Published 2017
Springer International Publishing
Table of Contents: ...1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs...

9
by Atluri, Vijay, Jajodia, Sushil, George, Binto
Published 2000
Springer US
Table of Contents: ...1. Introduction -- 1 Multilevel Secure Databases -- 2 Advanced Database Application Domains -- 3...

10
Published 2015
Springer International Publishing
Table of Contents: ...Security and Privacy Services -- On Secrecy Amplification Protocols -- Privacy-respecting Auctions...

11
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...DeCore: Detecting Content Repurposing Attacks on Clients’ Systems -- Network Security – I...

12
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying...

13
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages...

14
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Analysis -- Network Security -- Formal Models and Methods -- Protocol Analysis.- Privacy Enhancing Models...

15
Published 2004
Springer US
Table of Contents: ... -- Security and Differentiated Hotspot Services Through Policy-based Management Architecture -- Key Management...

16
Published 2004
Springer US
Table of Contents: ...Corporate Information Security Education -- Towards Corporate Information Security Obedience...

17
Published 2014
Springer Berlin Heidelberg
Table of Contents: ...Intrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment...

18
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... in Authentication Protocols -- Secure Location Verification...

19
Published 2007
Springer US
Table of Contents: ...Foundation -- Basic Security Concepts -- Access Control Policies and Languages in Open Environments...

20
Published 2020
Springer International Publishing
Table of Contents: ... framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms...