Electronic Books

Total Books: 61 - 77 /77
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Weiterlesen
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Weiterlesen
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Weiterlesen
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

Weiterlesen
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Weiterlesen
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Weiterlesen
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

Weiterlesen
Security and Cryptography for Networks

This volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...

Weiterlesen
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Weiterlesen
Security and Privacy in Digital Rights Management

This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...

Weiterlesen
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Security in Communication Networks

The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...

Weiterlesen
Topics in Cryptology – CT-RSA 2007

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held ...

Weiterlesen
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Weiterlesen
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

Weiterlesen
Trustworthy Global Computing ; Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers

This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC ...

Weiterlesen
Wireless Algorithms, Systems, and Applications : Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings

This book address current research and development efforts of various issues in the area of algorithms, systems and applications ...

Weiterlesen
Total Books: 61 - 77 /77