 
                This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
Weiterlesen 
                These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Weiterlesen 
                Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Weiterlesen 
                Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Weiterlesen 
                Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
Weiterlesen 
                The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Weiterlesen 
                Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
Weiterlesen 
                Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Weiterlesen 
                Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...
Weiterlesen 
                The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...
Weiterlesen