Electronic Books

Total Books: 61 - 77 /77
978-3-540-73408-6
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Continue reading
978-3-540-69485-4
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Continue reading
978-3-540-85259-9
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Continue reading
978-0-387-27696-0
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

Continue reading
978-3-540-77156-2
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Continue reading
978-3-540-31836-1
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Continue reading
978-3-540-40926-7
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

Continue reading
978-3-540-38081-8
Security and Cryptography for Networks

This volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...

Continue reading
978-3-540-85855-3
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Continue reading
978-3-540-47870-6
Security and Privacy in Digital Rights Management

This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...

Continue reading
978-0-387-25660-3
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Continue reading
978-3-540-30598-9
Security in Communication Networks

The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...

Continue reading
978-3-540-69328-4
Topics in Cryptology – CT-RSA 2007

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held ...

Continue reading
978-3-540-68979-9
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Continue reading
978-3-540-78663-4
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

Continue reading
978-3-540-75336-0
Trustworthy Global Computing ; Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers

This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC ...

Continue reading
978-3-540-88582-5
Wireless Algorithms, Systems, and Applications : Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings

This book address current research and development efforts of various issues in the area of algorithms, systems and applications ...

Continue reading
Total Books: 61 - 77 /77