Search from the table of contents of 2.5 million books
Advanced Search (Beta)
Home > Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings

Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings


Book Informaton

Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings

Author

Fengling Han, Ron van Schyndel (auth.), Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (eds.)

Series

Lecture Notes in Computer Science 7672 Security and Cryptology

Year of Publication

2012

Publisher

Springer-Verlag Berlin Heidelberg

Pages

510

Language

en

ISBN

9783642353611, 9783642353628

ARI Id

1672595655947


Find on

World Cat

OpenLibrary

Internet Archive


This page has been accessed 3 times.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Citation Options
Download Citation

Showing 1 to 20 of 38 entries
Chapters/HeadingsAuthor(s)PagesInfo
A General Transformation from KP-ABE to Searchable Encrypti
Supporting Security and Consistency for Cloud Databa
Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Sche
Collaborative Behavior Visualization and Its Detection by Observing Darknet Traff
SSH – Somewhat Secure Ho
Physical Access Control Administration Using Building Information Mode
Multiple Factors Based Evaluation of Fingerprint Images Quali
M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applicatio
SafeCode – Safeguarding Security and Privacy of User Data on Stolen iOS Devic
Protection Aspects of Iconic Passwords on Mobile Devic
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analys
A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filteri
Chattering-Free Terminal Sliding-Mode Observer for Anomaly Detecti
Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMI
Improving Content Availability in the I2P Anonymous File-Sharing Environme
V2GPriv: Vehicle-to-Grid Privacy in the Smart Gr
A Secure Architecture for Smart Meter Syste
A Novel Identity-Based Key Management and Encryption Scheme for Distributed Syst
An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynami
Robust Authentication of Public Access Points Using Digital Certificates – A Novel Approa
Chapters/HeadingsAuthor(s)PagesInfo
Showing 1 to 20 of 38 entries