Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.- Revocation and Non-repudiation: When the First Destroys the Latter.- New Results for the Practical Use of Range Proofs.- STUNT: A Simple, Transparent, User-Centered Network of Trust.- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange.- Towards a More Secure and Scalable Verifying PKI of eMRTD.- Mutual Restricted Identification.- Trust Views for the Web PKI.- A User-Centric Digital Signature Scheme.- A Test-Bed for Intrusion Detection Systems Results Post-processing.- Uncertainty in Intrusion Detection Signaling Games.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want