Author(s)
Bibliographic Information
Advances in information security
Kluwer Academic Publishers, c2001-
- Other Title
-
ADIS
Search this Book/Journal
Note
Publisher varies: Springer
-
21
- Primality testing and integer factorization in public-key cryptography
-
by Song Y. Yan
Springer c2009 2nd ed Advances in information security 11
Available at 4 libraries
-
22
- Secure key establishment
-
by Kim-Kwang Raymond Choo
Springer c2009 Advances in information security 41
Available at 2 libraries
-
23
- Secure multi-party non-repudiation protocols and applications
-
by José A. Onieva, Javier Lopez, Jianying Zhou
Springer c2009 Advances in information security 43
Available at 1 libraries
-
24
- Security for telecommunications networks
-
by Patrick Traynor, Patrick McDaniel, Thomas La Porta
Springer c2008 Advances in information security 40
Available at 3 libraries
-
25
- Intrusion detection systems
-
edited by Roberto Di Pietro and Luigi V. Mancini
Springer c2008 Advances in information security 38
Available at 1 libraries
-
26
- Insider attack and cyber security : beyond the hacker
-
by Salvatore J. Stolfo ... [et al.]
Springer c2008 Advances in information security 39
Available at 1 libraries
-
27
- Botnet detection : countering the largest security threat
-
edited by Wenke Lee, Cliff Wang, David Dagon
Springer c2008 Advances in information security 36
Available at 1 libraries
-
28
- Synchronizing internet protocol security (sipsec)
-
by Charles A. Shoniregun
Springer c2007 Advances in information security 34
Available at 1 libraries
-
29
- Security for wireless sensor networks
-
by Donggang Liu, Peng Ning
Springer c2007 Advances in information security 28
Available at 5 libraries
-
30
- Secure localization and time synchronization for wireless sensor and ad hoc networks
-
edited by Rhadha Poovendran, Cliff Wang, Sumit Roy
Springer c2007 Advances in information security 30
Available at 2 libraries
-
31
- Data warehousing and data mining techniques for cyber security
-
by Anoop Singhal
Springer c2007 Advances in information security 31
Available at 1 libraries
-
32
- Network security policies and procedures
-
by Douglas W. Frye
Springer c2007 Advances in information security 32
Available at 1 libraries
-
33
- Secure data management in decentralized systems
-
edited by Ting Yu, Sushil Jajodia
Springer c2007 Advances in information security 33
Available at 2 libraries
-
34
- Understanding intrusion detection through visualization
-
by Stefan Axelsson, David Sands
Springer c2006 Advances in information security v. 24
: hbk.
Available at 1 libraries
-
35
- Multivariate public key cryptosystems
-
Jintai Ding, Jason E. Gower, Dieter S. Schmidt
Springer c2006 Advances in information security 25
Available at 11 libraries
-
36
- Cryptographics : exploiting graphics cards for security
-
Debra L. Cook, Angelos D. Keromytis
Springer c2006 Advances in information security 20
Available at 2 libraries
-
37
- Privacy preserving data mining
-
Jaideep Vaidya, Christopher W. Clifton, Yu Michael Zhu
Springer c2006 Advances in information security 19
Available at 10 libraries
-
38
- Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES)
-
by Charles A. Shoniregun
Springer c2005 Advances in information security
ebook
Available at 2 libraries
-
39
- Intrusion detection and correlation : challenges and solutions
-
by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Springer c2005 Advances in information security 14
Available at 2 libraries
-
40
- Security in e-learning
-
by Edgar R. Weippl
Springer c2005 Advances in information security v. 16
: e-ISBN
Available at 3 libraries