1
Published 2021
Springer International Publishing
Subjects: ...Computer networks ...

2
by Onieva, José A., Zhou, Jianying
Published 2009
Springer US
Subjects: ...Computer Communication Networks...

3
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... of the Integrity and Authenticity of Web Resources -- Wireless Network Security III -- Self-organized Anonymous...

4
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...System Security I -- Defenses against the Truncation of Computation Results of Free-Roaming Agents...

5
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...A Fast Square Root Computation Using the Frobenius Mapping -- A Forward-Secure Blind Signature...

6
Published 2020
Springer International Publishing
Subjects: ...Computers...

7
Published 2020
Springer International Publishing
Subjects: ...Computers...

8
Published 2014
Springer International Publishing
Table of Contents: ... in Computational Model -- SBE – A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine --...

9
Published 2017
Springer International Publishing
Subjects: ...Computers...

10
Published 2011
Springer Berlin Heidelberg
Subjects: ...Computer science / Mathematics...

11
Published 2004
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...

12
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme...

13
Published 2020
Springer International Publishing
Subjects: ...Computer Communication Networks...

15
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... in Advanced Computational Infrastructure --...

16
Published 2015
Springer International Publishing
Table of Contents: ... -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion...

17
Published 2020
Springer International Publishing
Subjects: ...Computer Communication Networks...

18
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Computing -- Three-Round Secret Handshakes Based on ElGamal and DSA -- System Security -- Securing C...

19
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Using Trust for Restricted Delegation in Grid Environments -- Computer Vulnerability Evaluation...

20
Published 2012
Springer Berlin Heidelberg
Subjects: ...Computer Communication Networks...