1
by van Oorschot, Paul C.
Published 2020
Springer International Publishing
Table of Contents: ..., Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security...

2
by van Oorschot, Paul C.
Published 2021
Springer International Publishing
Table of Contents: ...1. Security Concepts and Principles -- 2. Cryptographic Building Blocks -- 3. User Authentication...

3
by Broeders, Dennis
Published 2016
Amsterdam University Press
Subjects: ...National security...

4
by Vacca, John R.
Published 2013
Syngress
Table of Contents: ...Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal...

5
by Topor, Lev
Published 2024
Springer Nature Switzerland
Table of Contents: ... -- Chapter 3. Sovereignty, Power, International Security and a Lack of International Law -- Chapter 4. Cyber...

6
Published 2013
Springer International Publishing
Table of Contents: ...Cyber as Deterrent -- Cyber Security and Cyber Weapons: is Nonproliferation possible? -- Cyber...

7
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy...

8
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Watermark with Large Capacity Using the Predictive Coding -- System Security -- PCAV: Internet Attack...

9
Published 2006
Springer Berlin Heidelberg
...Information Systems and Applications, incl. Internet/Web, and HCI...

10
Published 2020
Springer Nature Singapore
Table of Contents: ... for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel...

11
Published 1999
Springer US
Table of Contents: ...-encrypting Smart Cards -- 2. Real-time Risk Analysis on the Internet: a prototype -- 3. A practical approach...

12
Published 2018
Springer International Publishing
Table of Contents: ...! -- Three Decades of Digital Security -- The Pursuit of Cyber-Security -- Making it in the National Security...

13
Published 2005
Springer Berlin Heidelberg
...Information Systems and Applications, incl. Internet/Web, and HCI...

14
by Gupta, Ravi
Published 2013
John Wiley & Sons
Table of Contents: ... to solve security problems -- pt. 3. Crowdsourcing intelligence, solutions, and influence -- pt. 4...

15
Published 2023
Springer Nature Switzerland
Table of Contents: ... and Investigate Terrorist Content Online -- 3. Cell Site Analysis and ANPR Mapping -- 4. AI-Based Internet...

16
Published 2007
Vieweg+Teubner Verlag
Table of Contents: ... Security and Privacy in Addressing Crime and Terrorism on the Internet -- Data Encryption on File Servers...

17
Published 2022
Springer International Publishing
Table of Contents: ... Challenges for space security and sustainability -- 3. Cybersecurity in the second decade of the 21st century...

18
by Peiris, Chris, Kudrati, Abbas, Pillai, Binil
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ...Security Development Lifecycle (SDL) 193 -- Protecting the Hybrid Cloud Infrastructure 194 -- Azure...

19
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... on the Internet? Hint: Shush! -- A Security Audit Framework for Security Management in the Enterprise...

20
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...A Study on the Interrelations between the Security-Related Antecedents of Customers’ Online Trust...