1
Published 2018
Springer International Publishing
Table of Contents: ... & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web...

2
Published 2018
Springer International Publishing
Table of Contents: ... & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web...

3
Published 2019
Springer International Publishing
Table of Contents: ...Generating Phishing Emails Using Graph Database.-Short Paper II -- Evaluating Intrusion Sensitivity...

4
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... and Consistency for Cloud Database -- Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme...

5
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Databases -- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation -- Privacy...