This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). I...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and T...
This book constitutes the refereed proceedings of the 12th International Conference on Informatio...
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). I...
This book provides readers with up-to-date research of emerging cyber threats and defensive mecha...
Cyber security research is one of the important areas in the computer science domain which also p...
This book provides readers with up-to-date research of emerging cyber threats and defensive mecha...
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th Inte...
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th Inte...
This book constitutes the proceedings of the satellite workshops held around the 18th Internation...
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology...