Title: Data and Application Security: Developments and Directions, Author: B. Thuraisingham
Title: Trusted Information: The New Decade Challenge, Author: Michel Dupuy
Title: Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China, Author: Sihan Qing
Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Data and Applications Security XVII: Status and Prospects, Author: Sabrina De Capitani di Vimercati
Title: Database Security XII: Status and Prospects, Author: Sushil Jajodia
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Secure Data Management in Decentralized Systems, Author: Ting Yu
Title: Advances In Computer System Security, Vol. 3, Author: Rein Turn
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings, Author: Lynn Batten
Title: Analysis and Design of Stream Ciphers, Author: Rainer A. Rueppel
Title: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada, Author: Martin S. Olivier
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings, Author: Huaxiong Wang
Title: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, Author: Ton Kalker
Title: Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings, Author: Andreas Pfitzmann
Title: Digital Rights Management: Technological, Economic, Legal and Political Aspects, Author: Eberhard Becker
Title: Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, Author: Kijoon Chae
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Enterprise Identity Management: Towards an Investment Decision Support Approach, Author: Denis Royer

Pagination Links