1
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data encryption (Computer science)...

2
Published 2005
Springer US
Table of Contents: ... Secrets -- An Interactive Trust Management and Negotiation Scheme -- Complementing Computational Protocol...

3
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis...

4
Published 2005
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

5
Published 2013
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

6
Published 2014
Springer International Publishing
Subjects: ...Computer Science Logic and Foundations of Programming...

7
Published 2006
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

8
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative...

9
Published 2009
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

10
Published 2014
Springer International Publishing
Subjects: ...Computer science...

11
Published 2016
Springer International Publishing
Subjects: ...Data encryption (Computer science)...

12
Published 2016
Springer International Publishing
Subjects: ...Data encryption (Computer science)...

13
Published 2017
Springer International Publishing
Subjects: ...Computers and Society...

14
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations...

15
Published 2016
Springer International Publishing
Subjects: ...Computers and Society...

16
Published 2023
Springer International Publishing
Subjects: ...Computer crimes...

17
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted...