Secure Multi-Party Non-Repudiation Protocols and Applications More Books Like This

Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009
Principles of Protocol Design Principles of Protocol Design
2008
Blockchain Technology and Application Blockchain Technology and Application
2020
Accountability and Privacy in Network Security Accountability and Privacy in Network Security
2020
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008
Security in Fixed and Wireless Networks Security in Fixed and Wireless Networks
2016
Trusted Computing Trusted Computing
2009
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2007
70 Tips and Tricks for Mastering the CISSP Exam 70 Tips and Tricks for Mastering the CISSP Exam
2020
Blockchain Technology and Application Blockchain Technology and Application
2021
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2020
Blockchain – ICBC 2020 Blockchain – ICBC 2020
2020
Blockchain – ICBC 2018 Blockchain – ICBC 2018
2018
Security without Obscurity Security without Obscurity
2021
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014