Related Books

Computer Security -- ESORICS 2012
Language: en
Pages: 911
Authors: Sara Foresti
Categories: Computers
Type: BOOK - Published: 2012-08-19 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50
Protocols for Authentication and Key Establishment
Language: en
Pages: 542
Authors: Colin Boyd
Categories: Computers
Type: BOOK - Published: 2019-11-06 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentatio
Information Hiding in Communication Networks
Language: en
Pages: 278
Authors: Wojciech Mazurczyk
Categories: Technology & Engineering
Type: BOOK - Published: 2016-02-10 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. Highlights development tren
Data Analytics and Decision Support for Cybersecurity
Language: en
Pages: 278
Authors: Iván Palomares Carrascosa
Categories: Computers
Type: BOOK - Published: 2017-08-01 - Publisher: Springer

DOWNLOAD EBOOK

The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecu
Theory and Practice of Computation
Language: en
Pages: 217
Authors: Shin-ya Nishizaki
Categories: Computers
Type: BOOK - Published: 2019-09-20 - Publisher: CRC Press

DOWNLOAD EBOOK

This volume contains the papers presented at the 8th Workshop on Computing: Theory and Practice, WCTP 2018 and is devoted to theoretical and practical approache