Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopt...
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ci...
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of the insider ...
This book constitutes the thoroughly refereed post-conference proceedings of the 16th Internation...
This volume presents the refereed proceedings of the 8th International ICST Conference on Securit...
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was spo...
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cry...
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and s...
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being ad...
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was spo...
This book constitutes the thoroughly refereed post-conference proceedings of the 16th Internation...
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and s...