Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
| Main Authors: | Dhamija, Rachna (Author), Dietrich, Sven (Author) |
|---|---|
| Corporate Author: | FC 2007 |
| Format: | Conference Proceeding Book |
| Published: |
Berlin ; New York :
Springer ,
c2007
|
| Series: | Lecture notes in computer science, 0302-9743
4886 LNCS sublibrary. SL 4, Security and cryptology |
| Subjects: |
Similar Items
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Transportation security against terrorism
by: Ozen, Cinar, et al.
Published: (2009)
by: Ozen, Cinar, et al.
Published: (2009)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Visual cryptography and secret image sharing
by: Ching-Nung, Yang, et al.
Published: (2012)
by: Ching-Nung, Yang, et al.
Published: (2012)
Securing E-Business applications and communications
by: Held, Jonathan S., et al.
Published: (2001)
by: Held, Jonathan S., et al.
Published: (2001)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
بحوث مؤتمر الاعمال المصرفية الالكترونية بين الشريعة والقانون 9-11 ربيع الاول 1424ه المواقف 10-12 مايو 2003م، غرفة تجارة وصناعة دبي
by: جامعة الامارات العربية المتحدة
Published: (2003)
by: جامعة الامارات العربية المتحدة
Published: (2003)
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007)
Published: (2007)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Web services security and e-business
by: Radhamani, G. 1968-, et al.
Published: (2007)
by: Radhamani, G. 1968-, et al.
Published: (2007)
Digital business security development management technologies
by: Bryant, Kay 1954-, et al.
Published: (2011)
by: Bryant, Kay 1954-, et al.
Published: (2011)
Secure multi-party non-repudiation protocols and applications
by: Onieva, Jose A., et al.
Published: (2009)
by: Onieva, Jose A., et al.
Published: (2009)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Implementing email security and tokens current standards, tools, and practices
by: Turner, Sean H., et al.
Published: (2008)
by: Turner, Sean H., et al.
Published: (2008)
Information security for managers
by: Workman, Michael D. 1957-, et al.
Published: (2013)
by: Workman, Michael D. 1957-, et al.
Published: (2013)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Securing the clicks network security in the age of social media
by: Bahadur, Gary, et al.
Published: (2012)
by: Bahadur, Gary, et al.
Published: (2012)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
CWSP guide to wireless security
by: Ciampa, Mark D.
Published: (2007)
by: Ciampa, Mark D.
Published: (2007)
How to attack and defend your website
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Internet security professional reference
by: Atkins, Derek
Published: (1997)
by: Atkins, Derek
Published: (1997)
Wireless security
by: Osterhage, Wolfgang
Published: (2012)
by: Osterhage, Wolfgang
Published: (2012)
Security of mobile communications
by: Boudriga, Noureddine
Published: (2010)
by: Boudriga, Noureddine
Published: (2010)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Mobile application security
by: Dwivedi, Himanshu, et al.
Published: (2010)
by: Dwivedi, Himanshu, et al.
Published: (2010)
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Optimizing ieee 802.11i resource and security essentials for mobile and stationary devices
by: Naraei, Parisa, et al.
Published: (2015)
by: Naraei, Parisa, et al.
Published: (2015)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny, et al.
Published: (2007)
by: Cache, Johnny, et al.
Published: (2007)
Similar Items
-
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011) -
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007) -
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007) -
Transportation security against terrorism
by: Ozen, Cinar, et al.
Published: (2009) -
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)