This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative.
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected...
This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. software security and risk management;
This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in Septembe...
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. Malicious Code Defense and Mobile Security;
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Be...