Publication year: 2007
: 978-3-540-74835-9
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
: Computer Science, DBMS, Workflow Management, authorization schemes, communication, computer security, cryptography, data security, denial-of-service attacks, digital signatures, electronic voting, identity, intrusion detection, network security, secure communications, security