This book constitutes the refereed proceedings of the 12th International Conference on Informatio...
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). I...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and T...
This book provides readers with up-to-date research of emerging cyber threats and defensive mecha...
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). I...
Cyber security research is one of the important areas in the computer science domain which also p...
This book provides readers with up-to-date research of emerging cyber threats and defensive mecha...
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Ma...
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th Inte...
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th Inte...
This book constitutes the proceedings of the satellite workshops held around the 18th Internation...
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology...