„Spring Security“
Suchergebnisse
6.001 Treffer
-
Advances in Cryptology – ASIACRYPT 2014 – 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II
-
Intelligence and security informatics: biosurveillance – second NSF workshop, biosurveillance 2007, New Brunswick, NJ, USA, May 22, 2007 ; proceedings
-
Information security theory and practices – smart cards, mobile and ubiquitous computing systems ; first IFIP TC6, WG 8.8, WG 11.2 international workshop ; proceedings
-
Applications and techniques in information security – 5th international conference ; proceedings
-
Information security, practice and experience – third international conference ; proceedings
-
Handbook of Space Security – Policies, Applications and Programs
-
Advances in cryptology
-
Advances in cryptology
-
Information security applications – 7th international workshop ; revised selected papers
-
Computational intelligence in information assurance and security
-
Security, privacy and trust in modern data management – with 13 tables
-
Security and privacy in ad hoc and sensor networks – third European workshop ; revised selected papers
-
Critical information infrastructures security – first international workshop ; revised papers
-
Intelligence and security informatics – techniques and applications
-
Information systems security – second international conference ; proceedings
-
Computer science and its applications
-
Critical infrastructure protection VIII – 8th IFIP WG 11.10 international conference ; revised selected papers
-
Stabilization, Safety, and Security of Distributed Systems – 16th International Symposium, SSS 2014, Paderborn, Germany, September 28 – October 1, 2014. Proceedings
-
Formal correctness of security protocols – with 4 tables
-
Cryptology and network security – 5th international conference ; proceedings