This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Lee masThis book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Lee masThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Lee masThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Lee masThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Lee masThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
Lee masThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Lee masThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Lee masThis two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
Lee masThis two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
Lee masThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
Lee masThis volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...
Lee masThe double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
Lee masThe double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
Lee masThis book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, ...
Lee masThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Lee masThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
Lee masThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
Lee masThe First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
Lee masThis book constitutes the proceedings of the 17th International Conference on Distributed Computing and Internet Technology, ...
Lee mas