Sökt på: Böcker av Angelos D. Keromytis
totalt 16 träffar
Insider Attack and Cyber Security
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first …
Applied Cryptography and Network Security
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. …
Applied Cryptography and Network Security
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information …
CryptoGraphics
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. …
Financial Cryptography and Data Security
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in …
Applied Cryptography and Network Security
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information …
Voice over IP Security
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer …
Financial Cryptography and Data Security
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in …
Applied Cryptography and Network Security
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. …
CryptoGraphics
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. …
Insider Attack and Cyber Security
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first …
CryptoGraphics
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. …