Related Books
Language: en
Pages: 176
Pages: 176
Type: BOOK - Published: 2012-10-30 - Publisher: Springer Science & Business Media
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptogr
Language: en
Pages: 250
Pages: 250
Type: BOOK - Published: 2019-05-17 - Publisher: Springer
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Frede
Language: en
Pages: 109
Pages: 109
Type: BOOK - Published: 2022-06-30 - Publisher: Springer Nature
This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physi
Language: en
Pages: 458
Pages: 458
Type: BOOK - Published: 2018-06-05 - Publisher: Springer
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2
Language: en
Pages: 2353
Pages: 2353
Type: BOOK - Published: 2014-03-24 - Publisher: John Wiley & Sons
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immed