Electronic Books

Total Books: 1 - 11 /11
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

Weiterlesen
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Weiterlesen
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3956)

This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...

Weiterlesen
Cyber Security ; 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...

Weiterlesen
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

Weiterlesen
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

Weiterlesen
Mobile Ad-hoc and Sensor Networks (vol. # 4325)

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...

Weiterlesen
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Weiterlesen
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

Weiterlesen
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 3813)

It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor ...

Weiterlesen
Wireless and Mobile Device Security ; 2nd ed. / Jim Doherty

Provides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...

Weiterlesen
Total Books: 1 - 11 /11