Electronic Books

Total Books: 1 - 10 /10
978-3-540-68914-0
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...

Continue reading
978-3-540-31981-8
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

Continue reading
978-3-540-44605-7
Computer Security – ESORICS 2006

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...

Continue reading
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Continue reading
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Continue reading
978-3-540-32083-8
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

Continue reading
9788770220309
Secure and Smart Internet of Things (IoT) Using Blockchain and AI / Ahmed Banafa

Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...

Continue reading
978-3-540-77156-2
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Continue reading
978-3-540-31836-1
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Continue reading
978-3-540-32004-3
Security in Pervasive Computing (vol. # 3450)

The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...

Continue reading
Total Books: 1 - 10 /10