2741
by Salomon, David
Published 2006
Springer London
... Reference (now in its third edition), Data Privacy and Security, and Foundations of Computer Security...

2742
by Kizza, Joseph Migga
Published 2010
Springer London
... to computer security issues remain too elusive, and society continues to suffer at the hands of cyber...

2743
Published 2004
Springer Berlin Heidelberg
..., regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers’ Track...

2744
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... as a DoS Counter-Measure? -- Software Obfuscation -- On the Concept of Software Obfuscation in Computer...

2745
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...-Based Login in Pervasive Computing -- Secure Spontaneous Device Association -- AwareCon: Situation Aware...

2746
Published 2006
Springer Berlin Heidelberg
...The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security...

2747
Published 2019
Springer International Publishing
... and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer...

2748
Published 2018
Springer International Publishing

2749
Published 1991
Springer Berlin Heidelberg
... on configuration management, software factories, user interfacedesign, computer security, and technology transfer...

2750
by Salomon, David
Published 2007
Springer London
..., Foundations of Computer Security, and Transformations and Projections in Computer Graphics...

2751
Published 2000
Springer Berlin Heidelberg
..., Australia. The conference was sponsored by the Centre for Computer Security Research, University...

2752
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Side-Channel Attacks with FPGA Experiments -- Trusted Computing -- Secure Data Management in Trusted...

2753
Published 2019
Springer International Publishing
Table of Contents: ... Physical Topology-Preserving Computation -- Secure Best Arm Identification in Multi-Armed Bandits -- CATCHA...

2754
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... Based Cryptosystems -- Efficient Multiparty Computations Secure Against an Adaptive Adversary...

2755
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Computation -- Secure Sketch for Biometric Templates -- The 2-Adic CM Method for Genus 2 Curves...

2756
Published 1992
Springer Berlin Heidelberg
Table of Contents: ...Foundations of Secure Interactive Computing -- Secure Computation -- A Cryptographic Scheme...

2757
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way...

2758
Published 2020
Springer International Publishing
Table of Contents: ... networks of processes -- Cloud and Grid Computing -- Secure Content-based Image Retrieval using Combined...

2759
Published 1994
Springer Berlin Heidelberg
Table of Contents: ... Computation -- Secure Voting Using Partially Compatible Homomorphisms -- Maintaining Security in the Presence...

2760
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...: the Computationally-Bounded and Noisy Cases -- 2-Party Protocols -- Partial Fairness in Secure Two-Party Computation...