|
by Khattab, Ahmed, Jeddi, Zahra, Amini, Esmaeil, Bayoumi, Magdy
Published 2017
Table of Contents:
“...Part I. RFID Security Preliminaries -- 1. Introduction to RFID -- 2. RFID Security Threats...”Published 2017
Springer International Publishing
|
by Tang, Jack, Ibrahim, Mohamed, Chakrabarty, Krishnendu, Karri, Ramesh
Published 2020
Table of Contents:
“...Chapter 1. Cyberphysical Microfluidic Biochips -- Chapter 2. Security and Trust -- Chapter 3...”Published 2020
Springer International Publishing
|
by Sehgal, Naresh Kumar, Bhatt, Pramod Chandra P., Acken, John M.
Published 2020
Table of Contents:
“... and Information Security -- Migrating to Cloud -- Migrating a Complex Industry to Cloud -- Cost and Billing...”Published 2020
Springer International Publishing
|
by Farahmandi, Farimah, Huang, Yuanwen, Mishra, Prabhat
Published 2020
Table of Contents:
“...Introduction -- Security Verification Using Formal Methods -- Simulation-Based Security Validation...”Published 2020
Springer International Publishing