Related Books
Language: en
Pages: 911
Pages: 911
Type: BOOK - Published: 2012-08-19 - Publisher: Springer
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50
Language: en
Pages: 542
Pages: 542
Type: BOOK - Published: 2019-11-06 - Publisher: Springer Nature
This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentatio
Language: en
Pages: 278
Pages: 278
Type: BOOK - Published: 2016-02-10 - Publisher: John Wiley & Sons
Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. Highlights development tren
Language: en
Pages: 278
Pages: 278
Type: BOOK - Published: 2017-08-01 - Publisher: Springer
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecu
Language: en
Pages: 217
Pages: 217
Type: BOOK - Published: 2019-09-20 - Publisher: CRC Press
This volume contains the papers presented at the 8th Workshop on Computing: Theory and Practice, WCTP 2018 and is devoted to theoretical and practical approache