free tracker

Security Protocols Xx

Pub Date : 2012-11-28 | Author : Bruce Christianson | Publisher : Springer

ISBN 10 : 9783642356940
ISBN 13 : 364235694X

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following th..


Wireless Network Security

Pub Date : 2007-12-29 | Author : Yang Xiao | Publisher : Springer Science & Business Media

ISBN 10 : 0387331123
ISBN 13 : 9780387331126

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to..


Computational Intelligence And Security

Pub Date : 2005-12-05 | Author : Yue Hao | Publisher : Springer Science & Business Media

ISBN 10 : 3540308199
ISBN 13 : 9783540308195

The International Conference on Computational Intelligence and Security (CIS) is an annualinternationalconference that bringstogether researchers, engineers, developers and practit..


Data And Applications Security Xx

Pub Date : 2006-07-18 | Author : Ernesto Damiani | Publisher : Springer Science & Business Media

ISBN 10 : 9783540367963
ISBN 13 : 3540367969

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, ..


Security Protocols

Pub Date : 1997-02-25 | Author : Mark Lomas | Publisher : Springer

ISBN 10 : 3540624945
ISBN 13 : 9783540624943

This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on co..


Formal Correctness Of Security Protocols

Pub Date : 2007-05-27 | Author : Giampaolo Bella | Publisher : Springer Science & Business Media

ISBN 10 : 9783540681366
ISBN 13 : 3540681361

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols,..