„Spring Security“
Suchergebnisse
6.001 Treffer
-
Information Security Practice and Experience – 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
-
Statistical Learning and Data Sciences – Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings
-
Information Theoretic Security – 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
-
Accountability and Security in the Cloud – First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures
-
Food Security and Food Safety for the Twenty-first Century – Proceedings of APSAFE2013
-
Progress in Cryptology - LATINCRYPT 2014 – Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papers
-
Information Security and Cryptology – 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
-
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance – 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers
-
Ear Biometrics in 2D and 3D – Localization and Recognition
-
Food Security and Risk Reduction in Bangladesh
-
Information Security and Cryptology - ICISC 2014 – 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
-
Smart Card Research and Advanced Applications – 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers
-
Cloud Computing – 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers
-
Violence in Nigeria – Patterns and Trends
-
Counterfeit Integrated Circuits – Detection and Avoidance
-
India's Emerging Energy Relations – Issues and Challenges
-
Cyber-Risk Management
-
Physical and Data-Link Security Techniques for Future Communication Systems
-
Cybersecurity in Israel
-
Secure System Design and Trustable Computing