15. ICICS 2013: Beijing, China

Refine list

showing all ?? records

System Security

Web Security and Worm Detection

Cloud Storage Security

Virtualization for Cloud Computing

Trusted and Trustworthy Computing

Authentication and Security Protocols

Intrusion Detection and Recovery

Side Channel Attacks and Defense

Engineering Issues of Crypto


Attribute-Based Encryption

Cryptographic Primitives and Applications

a service of  Schloss Dagstuhl - Leibniz Center for Informatics