Privacy requirements have an increasing impact on the realization of modern applications. Commerc...
'Sometimes it's hard to see so many presidents that don't look like me.'
This book constitutes the refereed proceedings of the 11th International Workshop on Security and...
The 30 full papers presented together with 18 short papers and 8 poster papers were carefully rev...
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data ...
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Securit...
This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conferenc...
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th In...
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th In...
L'affreux sorcier Maldred veut s'emparer de la clé d'or pour contrôler le Naga, le dragon le plus...
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Securit...
Privacy requirements have an increasing impact on the realization of modern applications. Comm...