Home Advanced Search

Advanced Search - Page 1

Operational Semantics and Verification of Security Protocols
  • PDF
  • English
  • Year: 2012
  • Author: Cas Cremers, Sjouke Mauw (auth.)
Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings
  • PDF
  • English
  • Year: 2016
  • Author: Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser (eds.)
Secure Wireless Sensor Networks: Threats and Solutions
  • PDF
  • English
  • Year: 2015
  • Author: Mauro Conti (auth.)
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
  • PDF
  • English
  • Year: 2008
  • Author: Ton van Deursen, Sjouke Mauw, Saša Radomirović (auth.), Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis (eds.)
Cyber Threat Intelligence
  • PDF
  • English
  • Year: 2018
  • Author: Ali Dehghantanha, Mauro Conti, Tooska Dargahi
Versatile Cybersecurity
  • PDF
  • English
  • Year: 2018
  • Author: Mauro Conti, Gaurav Somani, Radha Poovendran
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II
  • PDF
  • English
  • Year: 2020
  • Author: Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi