Advances in Information Security
100Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Springer 2013 ISBN 978-1-4614-5415-1 [ contents ]
...…. ...
59Christian Rathgeb, Andreas Uhl, Peter Wild: Iris Biometrics - From Segmentation to Template Security. Springer 2013 ISBN 978-1-4614-5570-7, pp. 3-316 [ contents ]
...…. ...
54Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Springer 2011 ISBN 978-1-4614-0976-2 [ contents ]
53Charles A. Shoniregun, Kudakwashe Dube, Fredrick Mtenzi: Electronic Healthcare Information Security. Springer 2010 ISBN 978-0-387-84817-4, pp. 1-183 [ contents ]
52Aggelos Kiayias, Serdar Pehlivanoglu: Encryption for Digital Content. Springer 2010 ISBN 978-1-4419-0043-2, pp. 1-197 [ contents ]
51Sara Foresti: Preserving Privacy in Data Outsourcing. Springer 2011 ISBN 978-1-4419-7658-1, pp. 1-174 [ contents ]
50
49Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (Eds.): Insider Threats in Cyber Security. Springer 2010 ISBN 978-1-4419-7132-6 [ contents ]
48Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin: Adaptive Cryptographic Access Control. Springer 2010 ISBN 978-0-387-77265-3, pp. 1-135 [ contents ]
47Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee: Network Intrusion Detection and Prevention - Concepts and Techniques. Springer 2010 ISBN 978-0-387-88770-8, pp. 1-198 [ contents ]
46Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (Eds.): Cyber Situational Awareness - Issues and Research. Springer 2010 ISBN 978-1-4419-0139-2 [ contents ]
45Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis (Eds.): Security and Dependability for Ambient Intelligence. Springer 2009 ISBN 978-0-387-88774-6 [ contents ]
44Abhishek Singh: Identifying Malicious Code Through Reverse Engineering. Springer 2009 ISBN 978-0-387-09824-1, pp. 1-42 [ contents ]
43Jose Antonio Onieva, Javier Lopez, Jianying Zhou: Secure Multi-Party Non-Repudiation Protocols and Applications. Springer 2009 ISBN 978-0-387-75629-5, pp. 1-47 [ contents ]
42Michael Portnoy, Seymour E. Goodman: Global Initiatives to Secure Cyberspace - An Emerging Landscape. Springer 2009 ISBN 978-0-387-09763-3, pp. 1-32 [ contents ]
41Kim-Kwang Raymond Choo: Secure Key Establishment. Springer 2009 ISBN 978-0-387-87968-0, pp. 1-210 [ contents ]
40Patrick Traynor, Patrick McDaniel, Thomas F. La Porta: Security for Telecommunications Networks. Springer 2008 ISBN 978-0-387-72441-6, pp. 1-162 [ contents ]
39Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Springer 2008 ISBN 978-0-387-77321-6 [ contents ]
38…. ...
37Abhishek Singh, Baibhav Singh, Hirosh Joseph: Vulnerability Analysis and Defense for the Internet. Springer 2008 ISBN 978-0-387-74389-9, pp. 1-251 [ contents ]
36Wenke Lee, Cliff Wang, David Dagon (Eds.): Botnet Detection: Countering the Largest Security Threat. Springer 2008 ISBN 978-0-387-68768-1 [ contents ]
35Ulrich Flegel: Privacy-Respecting Intrusion Detection. Springer 2007 ISBN 978-0-387-34346-4, pp. 1-307 [ contents ]
34Charles A. Shoniregun: Synchronizing Internet Protocol Security (SIPSec). Springer 2007 ISBN 978-0-387-32724-2, pp. 1-218 [ contents ]
33Ting Yu, Sushil Jajodia (Eds.): Secure Data Management in Decentralized Systems. Springer 2007 ISBN 978-0-387-27694-6 [ contents ]
32Douglas Frye: Network Security Policies and Procedures. Springer 2007 ISBN 978-0-387-30937-8 [ contents ]
31Anoop Singhal: Data Warehousing and Data Mining Techniques for Cyber Security. Springer 2007 ISBN 978-0-387-26409-7, pp. 1-157 [ contents ]
30Radha Poovendran, Sumit Roy, Cliff Wang (Eds.): Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer 2007 ISBN 978-0-387-32721-1 [ contents ]
29Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-Line Analytical Processing (OLAP). Springer 2007 ISBN 978-0-387-46273-8, pp. 1-180 [ contents ]
28Donggang Liu, Peng Ning: Security for Wireless Sensor Networks. Springer 2007 ISBN 978-0-387-32723-5, pp. 1-209 [ contents ]
27Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (Eds.): Malware Detection. Springer 2007 ISBN 978-0-387-32720-4 [ contents ]
26Gerrit Bleumer: Electronic Postage Systems - Technology, Security, Economics. Springer 2007 ISBN 978-0-387-29313-4, pp. 1-248 [ contents ]
25Jintai Ding, Jason E. Gower, Dieter Schmidt: Multivariate Public Key Cryptosystems. Springer 2006 ISBN 978-0-387-32229-2, pp. 1-260 [ contents ]
24Stefan Axelsson, David Sands: Understanding Intrusion Detection Through Visualization. Springer 2006 ISBN 978-0-387-27634-2, pp. 1-145 [ contents ]
23Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin (Eds.): Quality of Protection - Security Measurements and Metrics. Springer 2006 ISBN 978-0-387-29016-4 [ contents ]
22John Aycock: Computer Viruses and Malware. Springer 2006 ISBN 978-0-387-30236-2, pp. 1-227 [ contents ]
21Chin-Tser Huang, Mohamed G. Gouda: Hop Integrity in the Internet. Springer 2006 ISBN 978-0-387-24426-6, pp. 1-112 [ contents ]
20Debra L. Cook, Angelos D. Keromytis: CryptoGraphics - Exploiting Graphics Cards for Security. Springer 2006 ISBN 978-0-387-29015-7, pp. 1-139 [ contents ]
19Jaideep Vaidya, Yu Zhu, Christopher W. Clifton: Privacy Preserving Data Mining. Springer 2006 ISBN 978-0-387-25886-7, pp. 1-121 [ contents ]
18Claus Vielhauer: Biometric User Authentication for it Security - From Fundamentals to Handwriting. Springer 2006 ISBN 978-0-387-26194-2, pp. 1-284 [ contents ]
17Charles A. Shoniregun: Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES). Springer 2005 ISBN 978-0-387-24343-6, pp. 1-196 [ contents ]
16
15Image and Video Encryption - From Digital Rights Management to Secured Personal Communication. Springer 2005 ISBN 978-0-387-23402-1, pp. 1-161 [ contents ]
14Christopher Kruegel, Fredrik Valeur, Giovanni Vigna: Intrusion Detection and Correlation - Challenges and Solutions. Springer 2005 ISBN 978-0-387-23398-7, pp. 1-118 [ contents ]
13Tommy M. McGuire, Mohamed G. Gouda: The Austin Protocol Compiler. Springer 2005 ISBN 978-0-387-23227-0, pp. 1-132 [ contents ]
12L. Jean Camp, Stephen Lewis (Eds.): Economics of Information Security. Springer 2004 ISBN 1-4020-8089-1 [ contents ]
11Song Y. Yan: Primality Testing and Integer Factorization in Public-Key Cryptography. Springer 2009 ISBN 978-0-387-77267-7, pp. 1-351 [ contents ]
10
9Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Springer 2003, pp. 1-112 [ contents ]
8Jun Li, Peter L. Reiher, Gerald J. Popek: Disseminating Security Updates at Internet Scale. Springer 2002, pp. 1-144 [ contents ]
7
6…. ...
5
4…. ...
3…. ...
2
1…. ...



