Electronic Books

Total Books: 1 - 20 /23
978-3-540-45893-7
Autonomic Networking

The autonomic communication paradigm has been defined mainly through the Autonomic Communications Forum (ACF) and particularly ...

Continue reading
978-3-319-62461-7
Big Data in Context

This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, ...

Continue reading
978-0-387-24486-0
Communications and Multimedia Security (vol. # 175)

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...

Continue reading
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Continue reading
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Continue reading
978-3-540-30569-9
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Continue reading
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Continue reading
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Continue reading
978-3-540-31823-1
Embedded Software and Systems (vol. # 3605)

Welcome to the post proceedings of the First International Conference on Embedded Software and Systems (ICESS 2004), which ...

Continue reading
978-3-540-31936-8
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

Continue reading
978-3-540-74810-6
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

Continue reading
978-3-8348-9418-2
ISSE/SECURE 2007 Securing Electronic Business Processes

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...

Continue reading
978-3-540-38343-7
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Continue reading
978-3-540-71093-6
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

Continue reading
978-3-540-31815-6
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

Continue reading
978-3-540-72354-7
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

Continue reading
978-0-387-38162-6
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Continue reading
978-0-387-09699-5
Proceedings of The IFIP Tc 11 23 "rd" International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Continue reading
978-3-540-32004-3
Security in Pervasive Computing (vol. # 3450)

The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...

Continue reading
978-3-540-33312-8
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Continue reading
Total Books: 1 - 20 /23