Research oriented non-repudiation protocols have been active since the beginning of this millenni...
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop o...
This book constitutes the refereed proceedings of the 14th International Conference on Informatio...
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Internationa...
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its ...
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its ...
This book constitutes the proceedings of the satellite workshops held around the 17th Internation...
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference ...
This book constitutes the refereed proceedings of the 15th International Conference on Informatio...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th Internation...
This book constitutes the proceedings of the 10th International Conference on Information Securit...
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 1...