1
Information Security and Privacy [E-Book] : 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings /
Table of Contents: ... for Sequential Modes of Operation -- Public-Key Cryptanalysis -- Handle the Traces: Revisiting the Attack on ECDSA with EHNP -- Hybrid Dual and Meet-LWE Attack -- Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 -- Public-Key...

Full text 
2
Cryptography, Codes and Cyber Security [E-Book] : First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings /
Table of Contents: ...Invited papers -- Cryptanalysis of a code-based identification scheme presented in CANS 2018 -- An Embedded AI-based Smart Intrusion Detection System for Edge-to-Cloud Systems -- A new addition law in twisted Edwards curves on non-local ring...

Full text 
3
Functional Safety and Proof of Compliance [E-Book] /
4
Smart Grid and Internet of Things [E-Book] : Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings /
5
Advances of Science and Technology [E-Book] : 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedings /
6
Machine Learning and Knowledge Discovery in Databases [E-Book] : European Conference, ECML PKDD 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part I /
7
Security and privacy in cyber-physical systems : foundations, principles, and applications [E-Book] /
8
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference [E-Book] : Science as the first countermeasure for CBRNE and Cyber threats /
9
Security, Privacy, and Anonymity in Computation, Communication, and Storage [E-Book] : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings /
10
Digital privacy in the marketplace : perspectives on the information exchange [E-Book] /
11
Getting started with FortiGate [E-Book] /
12
Oracle Data Guard 11gR2 administration beginner's guide : learn how to build and maintain Data Guard configurations with real-life, practical examples [E-Book] /
13
Data governance : how to design, deploy, and sustain an effective data governance program [E-Book] /
14
The death of the Internet / [E-Book]
15
Governance, risk, and compliance handbook for Oracle applications / [E-Book]
16
WordPress 3 ultimate security : protect your WordPress site and its network [E-Book] /
17
Information security, coding theory and related combinatorics : information coding and combinatorics [E-Book] /
18
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone [E-Book] /
19
Use of risk analysis in computer-aided persuasion [E-Book]/
20
Advances in artificial intelligence for privacy protection and security / [E-Book]