-
1
-
2Table of Contents: “… and Context-Aware Privacy Leakage Confinement -- Automatic Generation of Security-Centric Descriptions…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2015Table of Contents: “…Malware detection -- Mobile security -- Vulnerability analysis -- Applied cryptography -- Network…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2001Table of Contents: “… for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2004Table of Contents: “…Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2019Table of Contents: “…Systems Security -- Analysis and Visualization of Threats -- Applied Crypto.…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2018Table of Contents: “…Attack and defense -- Theory in security -- Web security and emerging technologies -- Systems…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2007Table of Contents: “…Public Key Crypto Applications/Virus Protection -- Controllable Ring Signatures -- Efficient User…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2006Table of Contents: “… on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2017Table of Contents: “…Network security -- Threat analysis -- Application security -- Cryptographic protocols…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2009Table of Contents: “… -- Application Security and Trust Management -- Image-Feature Based Human Identification Protocols on Limited…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2009Table of Contents: “… and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2010Table of Contents: “… O2 Platform - Open Platform for Automating Application Security Knowledge and Workflows…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2014Table of Contents: “…Cryptography -- Social network security -- Mobile security -- Network security -- Future…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2005Table of Contents: “…Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2007Table of Contents: “… on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic…”
Full Text via HEAL-Link
Electronic eBook -
17Table of Contents: “… of Biometrics -- Securing Biometrics Applications -- Critical Evaluation And Discussion -- Conclusion.…”
Full Text via HEAL-Link
Electronic eBook -
18
-
19
-
20