Search alternatives:
"secularity" » "regularity", "secularism"
"peculiarity" » "peculiarly", "peculiarities"

1
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol...

2
Published 2022
Springer International Publishing
Table of Contents: ... -- Artificial Intelligence for Detection -- Network Security and Forensics....

3
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Policy Enforcement and Monitoring -- Cost-Aware Runtime Enforcement of Security Policies...

4
Published 2018
Springer International Publishing
Table of Contents: ...Blockchain technology -- malware -- botnet and network security -- real-world cryptography...

5
Published 2016
Springer International Publishing
Table of Contents: ...Personal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security...

6
Published 1997
Springer US
... in database security, to enable readers to expand their knowledge. The book brings together contributions from...

7
Published 2014
Springer New York
Table of Contents: ...Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security...

8
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric...

9
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity...

10
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

11
Published 2000
Springer US
Table of Contents: ... -- Secure Concurrency Control in Firm Real-Time Database Systems -- A Secure Agent-based Framework...

12
Published 2018
Springer International Publishing
Table of Contents: ... -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server...

13
Published 2017
Springer International Publishing
Table of Contents: ... -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical...

15
Published 2003
Springer US
Table of Contents: ...CSAP — An Adaptable Security Module for the E-Government System Webocrat -- Perceptions of Security...

16
Published 2015
Springer International Publishing
Table of Contents: ... the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record...

17
Published 2004
Springer US
Table of Contents: ... -- Invited Talk - Towards Semantics-Aware Access Control -- System Security Analysis -- RBAC/MAC Security...

18
Published 2023
Springer Nature Switzerland
Table of Contents: ..., Prediction, and Recommendation using Process Mining Techniques -- Security and Cryptography -- A...

19
Published 2008
Springer US
Table of Contents: ...Using Virtualization to Create and Deploy Computer Security Lab Exercises -- DigForNet: Digital...

20
Published 2023
Springer Nature Switzerland
Table of Contents: ...SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over...