Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Security -- Building a Cryptovirus Using Microsoft’s Cryptographic API -- On the Security of the WinRAR...

2
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

3
Published 2017
Springer International Publishing
Subjects: ...Data and Information Security...

6
Published 2021
Springer International Publishing
Table of Contents: ... for Security and Trust -- Secure Implementation of a Quantum-Future GAKE Protocol -- Deciding a Fragment...

7
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... Masking — The Security Evaluation of 2-Key XCBC -- A New Statistical Testing for Symmetric Ciphers...

8
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Cryptography and Middleware Security -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code...

9
Published 2020
Springer International Publishing
Table of Contents: ...Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III...

10
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... Security Verification Method for Information Flow Security Policies Implemented in Operating Systems -- A...

11
Published 2013
Springer International Publishing
Table of Contents: ...System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization...

12
Published 2020
Springer International Publishing
Table of Contents: ... Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term...

13
Published 2015
Springer International Publishing
Table of Contents: ... Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware...

14
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical...

15
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems...

16
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks...

18
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

19
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Security Analysis of a Server-Aided RSA Key Generation Protocol -- Integrating Grid with Cryptographic...

20
by Jakobsson, Markus
Published 2004
Springer Berlin Heidelberg
Subjects: ...Information Systems Applications (incl.Internet)...