Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol...

2
Published 2016
Springer International Publishing
Subjects: ...Data and Information Security...

3
Published 2016
Springer International Publishing
Subjects: ...Data and Information Security...

4
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Formal Certification of ElGamal Encryption -- Secure Information Flow as a Safety Property -- Who...

5
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion...

6
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised...

7
Published 2017
Springer International Publishing
Subjects: ...Data and Information Security...

8
Published 2005
Springer US
Table of Contents: ...Security Issues in the Tuple-Space Coordination Model -- Information Flow Analysis...

9
Published 2016
Springer International Publishing
Subjects: ...Data and Information Security...

10
Published 2014
Springer International Publishing
Table of Contents: ...Model-Based Testing for Functional and Security Test Generation -- Model-Based Security Engineering...

11
Published 2014
Springer International Publishing
Table of Contents: ...A Structured Comparison of Security Standards -- Empirical Assessment of Security Requirements...

12
Published 2023
Springer International Publishing
Table of Contents: ...1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure...

13
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Symbolic Privacy Analysis through Linkability and Detectability -- Middleware-Based Security...

14
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust...

15
Published 2020
Springer International Publishing
Table of Contents: ...A Practice-Oriented, Control-Flow-Based Anomaly Detection Approach for Internal Process Audits...