Filter
Nätverkssäkerhet
Filter
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full …
2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose …
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. …
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 …
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full …
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers …
This book constitutes the refereed proceedings of the 4th International Conference on Security Standardisation Research, SSR 2018, held in Darmstadt, Germany, in November 2018.The …
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised …
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December …
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. …