This book constitutes the refereed proceedings of the 10th International Workshop on Security and...
Security protocols are widely used to ensure secure communications over insecure networks, such a...
Invited Lectures.- Temporal Process Logic.- An Unfolding Algorithm for Synchronous Products of Tr...
This volume constitutes the thoroughly refereed post-conference proceedings of the Second Interna...
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Work...
Graphical modeling of Security Arguments: Current State and Future Directions.- Evil Twins: Handl...
This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference...
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Ma...
This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference...
Security protocols are widely used to ensure secure communications over insecure networks, such a...