E-Commerce Security and Privacy
Workshop on Security and Privacy in Ecommerce and 1 more
Hardback
Not Available
Secure Electronic Voting
Dimitris Gritzalis
Economics of Information Security
L Jean Camp and 1 more
Paperback
Security in E-Learning
Edgar R Weippl
Impacts and Risk Assessment of Technology for Internet Security
Charles A Shoniregun
Hop Integrity in the Internet
ChinTser Huang and 1 more
Privacy Preserving Data Mining
Jaideep Vaidya and 2 more
Understanding Intrusion Detection Through Visualization
Stefan Axelsson and 1 more
Quality of Protection
Dieter Gollmann and 2 more
Computer Viruses and Malware
John Daniel Aycock
Security for Wireless Sensor Networks
Donggang Liu and 1 more
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
Radha Poovendran and 2 more
Electronic Postage Systems
Gerrit Bleumer
Secure Data Management in Decentralized Systems
Ting Yu and 1 more
Network Security Policies and Procedures
Douglas W Frye
Synchronizing Internet Protocol Security (SIPSec)
Privacy-Respecting Intrusion Detection
Ulrich Flegel
Insider Attack and Cyber Security
Workshop on Insider Attack and Cyber Security and 1 more
Intrusion Detection Systems
Roberto Di Pietro and 1 more
Secure Multi-Party Non-Repudiation Protocols and Applications
José A Onieva and 1 more
Primality Testing and Integer Factorization in Public-Key Cryptography
Song Y Yan
Secure Key Establishment
KimKwang Raymond Choo
Security and Dependability for Ambient Intelligence
George Spanoudakis and 1 more
Network Intrusion Detection and Prevention
Ali Ghorbani and 2 more
Insider Threats in Cyber Security
Christian W Probst
Spyware and Adware
Preserving Privacy in Data Outsourcing
Sara Foresti
Encryption for Digital Content
Aggelos Kiayias and 1 more
Electronic Healthcare Information Security
Charles A Shoniregun and 2 more
Multivariate Public Key Cryptosystems
Jintai Ding and 2 more
Cyber Situational Awareness
Sushil Jajodia and 3 more
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures
Neil F Johnson and 2 more
Adaptive Cryptographic Access Control
Anne V D M Kayem and 2 more
Synchronizing E-Security
Godfried B Williams
Iris Biometrics
Christian Rathgeb and 2 more
Intrusion Detection in Distributed Systems
Peng Ning and 2 more
Moving Target Defense
Sushil Jajodia and 4 more
Touchless Palmprint Recognition Systems
Angelo Genovese and 2 more
Protecting Privacy in Data Release
Giovanni Livraga
Secure Wireless Sensor Networks
Mauro Conti
Evolution of Cyber Technologies and Operations to 2035
Misty Blowers
Security and Resiliency Analytics for Smart Grids
Ehab S AlShaer and 1 more
Cybersecurity Systems for Human Cognition Augmentation
Robinson E Pino and 2 more
Cyber Warfare
Preserving Privacy Against Side-Channel Attacks
Wen Ming Liu and 1 more
Differential Privacy and Applications
Tianqing Zhu and 3 more
Smart Micro-Grid Systems Security and Privacy
Malicious Attack Propagation and Source Identification
Jiaojiao Jiang and 5 more
Versatile Cybersecurity
Mauro Conti and 2 more
Proactive and Dynamic Network Defense
Cliff Wang
Cloud Security Auditing
Suryadipta Majumdar and 3 more
Industrial Control Systems Security and Resiliency
Craig Rieger and 3 more
Cryptography Arithmetic
Amos R Omondi
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems
Quanyan Zhu and 1 more
Countering Cyberterrorism
Reza Montasari
Cyber Deception
Tiffany Bao and 2 more
Guide to Cybersecurity in Digital Transformation
Dietmar Möller
Blockchain for Cybersecurity in Cyber-Physical Systems
Yassine Maleh and 2 more
Autonomous Intelligent Cyber Defense Agent (AICA)
Alexander Kott
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava and 2 more