1
by van Oorschot, Paul C.
Published 2020
Springer International Publishing
Table of Contents: ..., Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security...

2
by van Oorschot, Paul C.
Published 2021
Springer International Publishing
Table of Contents: ...1. Security Concepts and Principles -- 2. Cryptographic Building Blocks -- 3. User Authentication...

3
by Broeders, Dennis
Published 2016
Amsterdam University Press
Subjects: ...National security...

4
by Vacca, John R.
Published 2013
Syngress
Table of Contents: ...Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal...

5
by Topor, Lev
Published 2024
Springer Nature Switzerland
Table of Contents: ... -- Chapter 3. Sovereignty, Power, International Security and a Lack of International Law -- Chapter 4. Cyber...

6
Published 2013
Springer International Publishing
Table of Contents: ...Cyber as Deterrent -- Cyber Security and Cyber Weapons: is Nonproliferation possible? -- Cyber...

7
Published 2023
Wiley
Table of Contents: ... -- Bringing Intelligence at the Network Data Plane for Internet of Things Security / Qiaofeng Qin...

8
Published 2023
Springer Nature Singapore
Table of Contents: ... Token-Based Access Control Mechanism for the Internet of Things Using Blockchain -- Cyber Security...

9
Published 2018
Springer Nature Singapore
Table of Contents: ... security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection...

10
Published 2020
Springer Nature Singapore
Table of Contents: ...Mobile Internet Security -- Mobile Application and Security -- Vehicular Network Security -- Deep...

11
Published 2019
Springer Nature Singapore
Table of Contents: ... Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR...

12
Published 2024
Springer Nature Singapore
Table of Contents: .... -- Network Design and Security. -- Intelligent Cooperative Routing for Services in Computing Integration...

13
Published 2022
Springer Nature Singapore
Table of Contents: ...IoT and Cyber Security -- Blockchain Security -- Digital Forensic and Malware Analysis -- 5G...

14
by Baron, Joshua William
Published 2015
RAND Corporation
Subjects: ...COMPUTERS / Internet / General...

15
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

16
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy...

17
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Watermark with Large Capacity Using the Predictive Coding -- System Security -- PCAV: Internet Attack...

18
Published 2006
Springer Berlin Heidelberg
...Information Systems and Applications, incl. Internet/Web, and HCI...

19
Published 2020
Springer Nature Singapore
Table of Contents: ... for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel...

20
Published 1999
Springer US
Table of Contents: ...-encrypting Smart Cards -- 2. Real-time Risk Analysis on the Internet: a prototype -- 3. A practical approach...