1
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Flow -- E-voting and Broadcast -- On E-Vote Integrity in the Case of Malicious Voter Computers...

2
Published 1993
Springer Berlin Heidelberg
Table of Contents: ...Trends in the fight against computer-related delinquency -- Technical approaches to Thwart computer...

4
Published 1998
Springer Berlin Heidelberg
Table of Contents: ...Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey...

5
Published 2014
Springer International Publishing
Table of Contents: ... Conceptual Modeling -- Towards a Higher-Dimensional String Theory for the Modeling of Computerized Systems...

6
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... of the Tiling Problem -- Remote Entrusting by Run-Time Software Authentication -- Trusted Computing — Special...

8
Published 2009
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

9
Published 2017
Springer Berlin Heidelberg
Table of Contents: ...Fraud and deception -- Payments, auctions, and e-voting -- Multiparty computation -- Mobile malware...

11
Published 2011
Springer Berlin Heidelberg
Subjects: ...Computer science / Mathematics...

12
Published 2021
Springer International Publishing
Table of Contents: ... Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from...

13
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Encryption -- Pervasive Computing -- Using Multiple Smart Cards for Signing Messages at Malicious Terminals...

14
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations...

15
Published 2015
Springer International Publishing
Subjects: ...Data encryption (Computer science)...

16
Published 2018
Springer International Publishing
Table of Contents: ... -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key...

17
Published 2006
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

18
Published 2014
Springer International Publishing
Subjects: ...Computers and Society...

19
Published 2014
Springer Berlin Heidelberg
Table of Contents: ...A Problem-Based Approach for Computer-Aided Privacy Threat Identification -- Conceptual Framework...

20
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Invited Papers -- Differential Privacy -- The One Way to Quantum Computation -- Zero-Knowledge...