Research oriented non-repudiation protocols have been active since the beginning of this mille...
This book gathers and analyzes the latest attacks, solutions, and trends inmobile networks. Its b...
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its ...
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin...
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference ...
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cr...
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Internationa...
InhaltsangabeThe Importance of Trust in Computer Security.- Trust MUSE: A Model-Driven Approach f...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th Internation...
This book constitutes the refereed proceedings of the 15th International Conference on Informatio...
Research oriented non-repudiation protocols have been active since the beginning of this millenni...