 
                This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Continue reading 
                This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Continue reading 
                This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Continue reading 
                This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Continue reading 
                This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
Continue reading 
                Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
Continue reading 
                For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
Continue reading 
                This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
Continue reading 
                This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
Continue reading 
                This book constitutes the refereed proceedings of the 11th International Conference on Database Systems for Advanced Applications, ...
Continue reading 
                This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Continue reading 
                This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Continue reading 
                This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Continue reading 
                This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Continue reading 
                This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Continue reading 
                The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
Continue reading 
                The book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, ...
Continue reading 
                This book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...
Continue reading 
                This book provides a forum for engineers and scientists in academia, industry, and governmentto address challenges and to ...
Continue reading