2761
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries --...

2762
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... Computation Secure against Dishonest Minorities from Scratch -- Perfectly Secure Message Transmission...

2764
Published 2004
Springer US
... applications, as well as for computer science researchers in computer architecture, computer security...

2765
Published 2017
Springer International Publishing
... and Communication Networks; and Computer Security and Information Privacy...

2766
by Kizza, Joseph Migga
Published 2009
Springer London

2767
Published 2020
Springer International Publishing

2768
by Salomon, David, Motta, Giovanni
Published 2010
Springer London
..., Transformations and Projections in Computer Graphics, Foundations of Computer Security, Curves and Surfaces...

2769
by Nguyen, Tho H.
Published 2016
Wiley
Table of Contents: ...; Deployment of the Cloud; Benefits of Cloud Computing; Disadvantages of Cloud Computing; Security: Cyber, Data...

2770
by Mukherjee, Aditya
Published 2020
Packt Publishing, Limited
Table of Contents: ... -- Securing cloud computing -- Security threats -- Countermeasures -- Wireless network security -- Wi-Fi...

2771
Published 2019
Springer International Publishing
Table of Contents: ... Industrial Control Systems -- A Hybrid Searchable Encryption Scheme for Cloud Computing -- Securing Cloud...

2772
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications...

2773
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... and Pervasive Computing -- Security Enhancement and Modular Treatment towards Authenticated Key Exchange...

2774
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...Multi-Party Computation -- MPC vs. SFE : Unconditional and Computational Security -- Strongly...

2775
Published 2002
Springer US
Table of Contents: ... Detection In Face Recognition Systems -- 5 Computer Security and Safety -- Software support...

2776
Published 1988
Springer Berlin Heidelberg
Table of Contents: ... Public Key -- Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model...

2777
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management...

2778
Published 2022
Springer Nature Switzerland
Table of Contents: ...A Context-aware Approach to Scheduling of Multi-Data- Source Tasks in Mobile Edge Computing...

2779
Published 2023
Wiley
Table of Contents: ... / Huma Naz, Sachin Ahuja, Rahul Nijhawan, Neelu Jyothi Ahuja -- Cloud Computing Security, Risk...

2780
Published 2023
Springer Nature Singapore
Table of Contents: ... System Stabilizer -- Network Intrusion Detection System for Cloud Computing security usingDeep Neural...