Sold Out
Book Categories |
Biometric Authentication in Infrastructure Security | 1 | |
Denial of Access in Biometrics-Based Authentication Systems | 19 | |
A Novel Approach to Proactive Password Checking | 30 | |
Single Sign-On Architectures | 40 | |
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information | 59 | |
How to Buy Better Testing (Using Competition to Get the Most Security and Robustness for Your Dollar) | 73 | |
Structured Risk Analysis | 88 | |
A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls | 104 | |
Authentication and Authorization of Mobile Clients in Public Data Networks | 115 | |
A Contemporary Foreword on GSM Security | 129 | |
Vulnerability Assessment Simulation for Information Infrastructure Protection | 145 | |
Pseudonymizing Unix Log Files | 162 | |
DPS: An Architectural Style for Development of Secure Software | 180 | |
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping | 199 | |
Different Smartcard-Based Approaches to Physical Access Control | 214 | |
Authenticity and Provability - A Formal Framework | 227 | |
Protocol Engineering Applied to Formal Analysis of Security Systems | 246 | |
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems | 260 | |
Plausible Deniability Using Automated Linguistic Stegonagraphy | 276 | |
Virtual Software Tokens - A Practical Way to Secure PKI Roaming | 288 | |
Bit-Serial AOP Arithmetic Architectures over GF(2m) | 303 | |
A Practical Distributed Authorization System for GARA | 314 | |
Design of a VPN Software Solution Integrating TCP and UDP Services | 325 | |
Author Index | 339 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInfrastructure Security
X
This Item is in Your InventoryInfrastructure Security
X
You must be logged in to review the productsX
X
X
Add Infrastructure Security, This book constitutes the refereed proceedings of the Infrastructure Security Conference, InfraSec 2002, held in Bristol, UK in October 2002. The 23 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are, Infrastructure Security to the inventory that you are selling on WonderClubX
X
Add Infrastructure Security, This book constitutes the refereed proceedings of the Infrastructure Security Conference, InfraSec 2002, held in Bristol, UK in October 2002. The 23 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are, Infrastructure Security to your collection on WonderClub |