281
by Adams, Carlisle
Published 2021
Springer International Publishing
Subjects: ...Computer networks / Security measures...

282
by Banoth, Rajkumar, Regar, Rekha
Published 2023
Springer Nature Switzerland
Table of Contents: ...Chapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards...

283
Published 2024
Springer International Publishing
Table of Contents: ... Blockchain System: An Overview of Security and Privacy Aspects -- The Ethereum Blockchain: Implementation...

284
Published 2024
Springer Nature Singapore
Table of Contents: ...1. IoT Communication models and technology requirements -- 2. Security challenges in IoT -- 3...

285
Published 2019
Springer International Publishing
Table of Contents: ...SiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication...

286
Published 2022
Springer Nature Singapore
Table of Contents: ...Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric -- Mobile Operating...

287
Published 2024
Springer Nature Singapore
Table of Contents: ... Labeling -- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation -- Face...

288
Published 2020
Springer International Publishing
Table of Contents: ...Public-key encryption. - Implementation -- Homomorphic encryption -- Secure multiparty computation...

289
by Joshi, James B. D.
Published 2008
Morgan Kaufmann/Elsevier
Table of Contents: ...; Chapter 7 Security in Wireless Systems; Chapter 8 Mobile Security and Privacy; Chapter 9 Optical Network...

290
Published 2020
Springer Nature Singapore
Table of Contents: ...Big Data Security -- Social Networks -- Privacy-preserving and Security...

291
by Herfurth, Constantin
Published 2022
Springer Fachmedien Wiesbaden
Subjects: ...Computer networks—Security measures...

292
Published 2021
Springer Nature Singapore
Table of Contents: ... Institute and Visualization by Noise Maps using Computational Software: A Case Study -- Chapter 9. RainRoof...

293
by Shepherd, Carlton, Markantonakis, Konstantinos
Published 2024
Springer International Publishing
Table of Contents: ... -- Enclave Computing -- Deployment Issues, Attacks, and Other Challenges -- Conclusion...

294
by Hoog, Andrew
Published 2011
Syngress
Table of Contents: ...Chapter 1 Android and Mobile Forensics Chapter 2 Android Hardware Platforms Chapter 3 Android...

295
Published 2023
Springer Nature Switzerland
Table of Contents: ... -- Take your MEDS: Digital Signatures from Matrix Code Equivalence -- Efficient computation of (3 n,3 n...

296
by Doherty, Jim
Published 2006
Cisco Press
Table of Contents: ...Tip 1, use firewalls -- Tip 2, secure your wireless network -- Tip 3, use antivirus protection...

297
Published 2021
Springer International Publishing
Subjects: ...Computer networks / Security measures...

298
Published 2021
Springer International Publishing
Table of Contents: ... and Security -- Side-Channel Attacks and Deep Learning -- Primitives and Tools for Physical Attacks Resistance...

299
Published 2022
Springer International Publishing
Table of Contents: ... solutions for DDoS mitigation in 5G Multi-access Edge Computing -- Long-Term Secure Asymmetric Group Key...

300
Published 2020
Springer International Publishing
Table of Contents: ...Security Games over Lexicographic Orders -- Game Theory on Attack Graph for Cyber Deception...