This book comes after several decades of outstanding and successful research that has helped ameliorate some of the most ...
Continue reading
This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...
Continue reading
Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...
Continue reading
History based access control and secure information flow The spec# programming system Mastering test generation from smart ...
Continue reading
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...
Continue reading
This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Continue reading
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
Continue reading
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue reading
Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...
Continue reading
This book is a guide which treats many components used in mobile communications, and in particular focuses on non-volatile ...
Continue reading
This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
Continue reading
Real Photo Postcards is a collection of the most outlandish and idiosyncratic, beautiful and even occasionally bizarre images ...
Continue reading
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Continue reading
The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...
Continue reading
Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
Continue reading
This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...
Continue reading