Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

41
Published 2005
Springer Berlin Heidelberg
Table of Contents: ..., and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity...

42
Published 2019
Springer International Publishing
Subjects: ...Mobile and Network Security...

43
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems -- A Framework for Secure and Private P2P...

44
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response...

45
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... the Linear Complexity of Periodic Sequences -- Zero-Knowledge and Secure Computations -- An Unbounded...

46
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

47
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve...

48
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

49
Published 2015
Springer International Publishing
Table of Contents: ...Signature and authentication -- Secure protocols and access control -- Cloud security...

50
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage...

51
Published 2016
Springer International Publishing
Table of Contents: ... and applications -- Encryptions and signatures -- Security model -- Trusted technologies -- Software and system...

53
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Schemes with Tag-KEMs -- Security-Mediated Certificateless Cryptography -- k-Times Anonymous...

54
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Secure Remote Fingerprint Verification Using Dual Watermarks -- Supporting Cryptographic Technology...