1
by Schneider, Thomas
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...

2
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

3
by Reardon, Joel
Published 2016
Springer International Publishing
Table of Contents: ...Introduction -- Related Work on Secure Deletion -- System Model and Security Goal -- Flash Memory...

4
by Jürjens, Jan
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Prologue -- Walk-through: Using UML for Security -- Background -- Developing Secure Systems...

5
by Matulevičius, Raimundas
Published 2017
Springer International Publishing
Subjects: ...Data and Information Security...

6
by Giustolisi, Rosario
Published 2018
Springer International Publishing
Table of Contents: ...Introduction -- Preliminaries and Definitions -- Security Requirements -- The Huszti-Pethő Protocol...

7
by Underwood, Robert G.
Published 2022
Springer International Publishing

8
by Chen, Hsinchun
Published 2006
Springer US
Table of Contents: ...Intelligence and Security Informatics (ISI): Challenges and Opportunities -- An ISI Research...

9
Published 2007
Vieweg+Teubner Verlag
Table of Contents: ... Cards: New Security Challenges and Applications -- ID Cards in Practice -- Large Scale Fingerprint...

10
by Choo, Kim-Kwang Raymond
Published 2009
Springer US
Subjects: ...Data and Information Security...

11
Published 2020
Springer International Publishing
Table of Contents: ... for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis...

12
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Multibase Number Representation -- Database Security and Privacy -- Enforcing Confidentiality in Relational...

13
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Authentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach...

14
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- Efficient and Provably Secure Certificateless Multi-receiver Signcryption -- A CCA Secure Hybrid Damgård’s...

15
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

16
Published 2011
Springer Berlin Heidelberg
... submissions and focuse on the various aspects of security technology...

17
Published 2009
Vieweg+Teubner Verlag
Table of Contents: ...Security Awareness: Von der Oldschool in die Next Generation – eine Einführung -- Definition von...

18
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

19
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Supply chain and critical infrastructure protection -- Security situational awareness -- Crisis...

20
Published 2012
Springer Berlin Heidelberg
Table of Contents: ....- information theoretical security...