Electronic Books

Total Books: 1 - 20 /20
Autonomic Networking

The autonomic communication paradigm has been defined mainly through the Autonomic Communications Forum (ACF) and particularly ...

Weiterlesen
Communications and Multimedia Security (vol. # 175)

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...

Weiterlesen
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Weiterlesen
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Weiterlesen
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Weiterlesen
Embedded Software and Systems (vol. # 3605)

Welcome to the post proceedings of the First International Conference on Embedded Software and Systems (ICESS 2004), which ...

Weiterlesen
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

Weiterlesen
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

Weiterlesen
ISSE/SECURE 2007 Securing Electronic Business Processes

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...

Weiterlesen
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Weiterlesen
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

Weiterlesen
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

Weiterlesen
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

Weiterlesen
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Weiterlesen
Proceedings of The IFIP Tc 11 23 "rd" International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Security in Pervasive Computing (vol. # 3450)

The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...

Weiterlesen
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Weiterlesen
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Weiterlesen
Testing of Communicating Systems (vol. # 3502)

This book constitutes the refereed proceedings of the 17th IFIP TC 6/WG 6.1 International Conference on Testing Communicating ...

Weiterlesen
Trust, Privacy, and Security in Digital Business

“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...

Weiterlesen
Total Books: 1 - 20 /20