Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007
| Main Author: | Bao, Feng Dr (Author) |
|---|---|
| Corporate Authors: | International Conference on Cryptology and Network Security (6th : 2007 : Singapore), International Association for Cryptologic Research |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
Berlin
Springer
c2007
|
| Series: | Lecture notes in computer science
4856 |
| Subjects: | |
| Online Access: | Publisher description |
Similar Items
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)
by: Galbraith, Steven D.
Published: (2007)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Network security
by: Shaffer, Steven L.
Published: (1994)
by: Shaffer, Steven L.
Published: (1994)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Network security : the complete reference
by: Bragg, Roberta, et al.
Published: (2004)
by: Bragg, Roberta, et al.
Published: (2004)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
Network security current status and future directions
by: Douligeris, C. (Christos), et al.
Published: (2007)
by: Douligeris, C. (Christos), et al.
Published: (2007)
Fundamentals of network security
by: Canavan, John E.
Published: (2001)
by: Canavan, John E.
Published: (2001)
Network security fundamentals project manual
by: Reese, Rachelle, et al.
Published: (2007)
by: Reese, Rachelle, et al.
Published: (2007)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
How to cheat at securing your network
by: Dubrawsky, Ido
Published: (2007)
by: Dubrawsky, Ido
Published: (2007)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Network security firewalls and VPNs
by: Stewart, James Michael
Published: (2011)
by: Stewart, James Michael
Published: (2011)
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007)
Published: (2007)
Securing the clicks network security in the age of social media
by: Bahadur, Gary, et al.
Published: (2012)
by: Bahadur, Gary, et al.
Published: (2012)
Network security a decision and game-theoretic approach
by: Alpcan, Tansu 1975-, et al.
Published: (2010)
by: Alpcan, Tansu 1975-, et al.
Published: (2010)
Security of self-organizing networks : MANET, WSN, WMN, VANET
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Transportation security against terrorism
by: Ozen, Cinar, et al.
Published: (2009)
by: Ozen, Cinar, et al.
Published: (2009)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Security and resilience in intelligent data-centric systems and communication networks
Flexible network architectures security issues and principles
by: Rudra, Bhawana
by: Rudra, Bhawana
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Guide to firewalls and network security with intrusion detection and VPNs
by: Whitman, Michael E. 1964-
Published: (2009)
by: Whitman, Michael E. 1964-
Published: (2009)
Guide to firewalls and network security with intrusion detection and VPNs
by: Holden, Greg
Published: (2004)
by: Holden, Greg
Published: (2004)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Similar Items
-
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008) -
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008) -
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007) -
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007) -
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)