21
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... Address -- A: The Environment and Security Nexus -- Environment and Security in International Politics...

22
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes -- Quantum...

23
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Integration for Interoperating Social and Health Systems -- Data Security in Open Environments -- Joining...

24
Published 2021
Springer International Publishing
Table of Contents: ... Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled...

25
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against...

26
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...) to MLP (Machine Language Processing) -- Security of Multi-agent Systems and Software Protection -- Secure...

27
Published 2023
Springer Nature Switzerland
Table of Contents: ...Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind...

28
Published 2024
Springer Nature Switzerland
Table of Contents: ... for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security...

29
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response...

30
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...CSS 2012 Regular Papers -- Session 1: Mobile Security -- Identity and Its Authentication Protocol...

31
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... the Linear Complexity of Periodic Sequences -- Zero-Knowledge and Secure Computations -- An Unbounded...

32
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Distributed Security-Aware Applications -- Signatures -- Efficient and Provably Secure Multi-receiver Identity...

33
by Witte, Greg
Published 2012
McGraw-Hill
Table of Contents: ... -- Granularity -- Customization -- Performance -- Regular Expressions -- Chapter 8: Putting Security Automation...

34
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault...

35
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Software Self-healing Systems -- Assumptions: The Trojan Horses of Secure Protocols -- Smart Cards...

36
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Security -- Provably Correct Runtime Enforcement of Non-interference Properties -- An Attack on SMC-Based...

37
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning -- System Security: Malware...

38
by Binnie, Chris, McCune, Rory
Published 2021
John Wiley & Sons
Table of Contents: ... Security Settings 229 -- Automated S3 Attacks 231 -- Storage Hunting 234 -- Summary 236 -- Part IV Advanced...

39
Published 2019
Springer International Publishing
Table of Contents: ... for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data...

40
Published 2021
Springer International Publishing
Table of Contents: ... Hyperactivity Disorder with Laplacian Regularization --...