Search results for: Stelios Dritsas
Lecture Notes in Computer Science > Critical Information Infrastructures Security > Session 8: Threats and Attacks Modeling > 299-310
Lecture Notes in Computer Science > Computer Network Security > Mathematical Models, Architectures and Protocols for Computer Network Security > 151-164
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 10: VoIP Security, Malware, and DRM > 446-460
Lecture Notes in Computer Science > Trust and Privacy in Digital Business > Session 4: Privacy Enhancing Technologies and Privacy Management > 103-113
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Reliability and Security of Content and Data > 74-85
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Security and Privacy Models for Pervasive Information Systems > 49-61
Lecture Notes in Computer Science > Computer Network Security > Mathematical Models and Architectures for Computer Network Security > 100-111
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Next Generation Society. Technological and Legal Issues > Session 6: Security, Attacks and Crime > 189-198
Telematics and Informatics > 2006 > 23 > 3 > 196-210