This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingThe book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
Continue readingHere are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
Continue readingThis book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Continue readingThis book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Continue readingDistributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed ...
Continue readingThis book investigates the methodological and ethical dilemmas involved when working with digital technologies and large-scale ...
Continue readingIt aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Continue readingAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Continue readingThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Continue readingthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Continue readingNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Continue readingThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Continue readingWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue readingThis book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Continue readingYou hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Continue reading"These procee dingscontain the papers of the 3rd European Workshopon Security and Privacy in Ad Hoc and Sensor Networks ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
Continue readingThis book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
Continue readingInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue reading