This book comes after several decades of outstanding and successful research that has helped ameliorate some of the most ...
Continue readingThis collection of papers offers real-life application experiences, research results and methodological proposals of direct ...
Continue readingCommunications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...
Continue readingHistory based access control and secure information flow The spec# programming system Mastering test generation from smart ...
Continue readingThe increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...
Continue readingThis book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Continue readingThis book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
Continue readingThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue readingConstitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...
Continue readingThis book is a guide which treats many components used in mobile communications, and in particular focuses on non-volatile ...
Continue readingThis book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
Continue readingReal Photo Postcards is a collection of the most outlandish and idiosyncratic, beautiful and even occasionally bizarre images ...
Continue readingBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Continue readingThe objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...
Continue readingSmart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
Continue readingThis book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...
Continue reading