Smart Cards, Tokens, Security and Applications More Books Like This

Smart Card Security Smart Card Security
2019
Hacking Point of Sale Hacking Point of Sale
2014
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008
Platform Embedded Security Technology Revealed Platform Embedded Security Technology Revealed
2014
Global E-Security Global E-Security
2008
Trusted Computing Trusted Computing
2009
ISSE 2008 Securing Electronic Business Processes ISSE 2008 Securing Electronic Business Processes
2009
ISSE 2006 Securing Electronic Business Processes ISSE 2006 Securing Electronic Business Processes
2007
Web Commerce Security Web Commerce Security
2011
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009
Trust and Trustworthy Computing Trust and Trustworthy Computing
2010
Security and Privacy Trends in the Industrial Internet of Things Security and Privacy Trends in the Industrial Internet of Things
2019
Identity and Privacy in the Internet Age Identity and Privacy in the Internet Age
2009
Bootstrapping Trust in Modern Computers Bootstrapping Trust in Modern Computers
2011