Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

21
Published 2015
Springer International Publishing
Table of Contents: ... Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware...

22
Published 2013
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

23
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Inter-domain Identity-Based Proxy Re-encryption -- Access Control and Network Security -- Hardening...

24
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design...

25
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

26
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2...

27
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment...

28
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

29
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

30
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems -- Cryptanalysis vs...

31
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure...

32
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Wireless and Sensor Network Security(2) -- Compact Implementation of SHA-1 Hash Function for Mobile...

33
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Distribution and Charging Scheme Using Group Signature -- Secret Handshake with Multiple Groups -- Internet...

34
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...

35
Published 2024
Springer Nature Singapore
Table of Contents: ...Poster: An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things...

36
Published 2024
Springer Nature Singapore
Table of Contents: ...Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity...

37
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems...

38
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks...

40
by Jakobsson, Markus
Published 2004
Springer Berlin Heidelberg
Subjects: ...Information Systems Applications (incl.Internet)...