Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol...

2
Published 2010
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

3
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

4
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

5
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

6
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...

7
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks...

8
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging...

9
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Schemes -- Security Mediated Certificateless Signatures -- Gradually Convertible Undeniable Signatures...

10
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based...

11
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud...

12
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

13
Published 2016
Springer International Publishing
Table of Contents: ... and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system...