Sold Out
Book Categories |
An abstract reduction model for computer security risk | 1 | |
Remediation graphs for security patch management | 17 | |
Security modelling for risk analysis | 29 | |
Contrasting malicious Java Applets by modifying the Java virtual machine | 47 | |
Analyzing network management effects with SPIN and cTLA | 65 | |
Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics | 83 | |
Meeting the global challenges of security incident response | 101 | |
Security in globally distributed industrial information systems | 119 | |
A case for information ownership in ERP systems | 135 | |
Interactive access control for Web services | 151 | |
Identity-based key infrastructures (IKI) | 167 | |
ModInt : compact modular arithmatic class library available on cellular phone and its application to secure electronic voting system | 177 | |
Dependable security by twisted secret sharing | 193 | |
A language driven IDS for event and alert correlation | 209 | |
Install-time vaccination of Windows executables to defend against stack smashing attacks | 225 | |
Eigenconnections to intrusion detection | 241 | |
Visualising intrusions : watching the Webserver | 259 | |
A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies | 275 | |
Trusted computing, trusted third parties, and verified communications | 291 | |
Maille authentication - a novel protocol for distributed authentication | 309 | |
Supporting end-to-end security across proxies with multiple-channel SSL | 323 | |
A content-protection scheme for multi-layered reselling structure | 339 | |
An asymmetric cryptography secure channel protocol for smart cards | 351 | |
IPsec clustering | 367 | |
Improving secure device insertion in home ad-hoc networks keyword latencies | 381 | |
Spam filter analysis | 395 | |
Collective signature for efficient authentication of XML documents | 411 | |
Updating encrypted XML documents on untrusted machines | 425 | |
Efficient simultaneous contract signing | 441 | |
DHCP authentication using certificates | 457 | |
Recursive sandboxes : extending systrace to empower applications | 473 | |
Fast digital certificate revocation | 489 | |
MASKS : managing anonymity while sharing knowledge to servers | 501 | |
Security and differentiated hotspot services through policy-based management architecture | 517 | |
Key management for secure multicast in hybrid satellite networks | 533 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity and Protection in Information Processing Systems
X
This Item is in Your InventorySecurity and Protection in Information Processing Systems
X
You must be logged in to review the productsX
X
X
Add Security and Protection in Information Processing Systems, Security is probably the most critical factor for the development of the Information Society. E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, e, Security and Protection in Information Processing Systems to the inventory that you are selling on WonderClubX
X
Add Security and Protection in Information Processing Systems, Security is probably the most critical factor for the development of the Information Society. E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, e, Security and Protection in Information Processing Systems to your collection on WonderClub |