Search results for: Miguel Soriano
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 3: Communication Risk and Assurance II > 94-105
Lecture Notes in Computer Science > Mobile Agents for Telecommunication Applications > Agent Platforms – Security > 286-295
Lecture Notes in Computer Science > Mobility Aware Technologies and Applications > Security Issues > 224-233
Lecture Notes in Computer Science > Database and Expert Systems Applications > Security II > 927-936
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security Protocols > 280-292
Lecture Notes in Computer Science > Digital Watermarking > Session V: Special Session on Watermarking Security > 231-243
Lecture Notes in Computer Science > Grid and Cooperative Computing > Session 5: Web Security and Web Services > 875-882
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 10: VoIP Security, Malware, and DRM > 501-516
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 527-536
Lecture Notes in Computer Science > Web Engineering > Security > 289-292
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Traitor Tracing and Visual Cryptography > 414-429
Lecture Notes in Computer Science > Information Security Applications > Public Key Cryptography / Key Management > 410-424
Lecture Notes in Computer Science > Computational Science - ICCS 2004 > Workshop on First International Workshop on Active and Programmable Grids Architectures and Components > 174-178
Lecture Notes in Computer Science
The Internet of Things > Security and Privacy Issues > 421-430