-
1
-
2Published in Springer eBooks (2013)Table of Contents: “... -- Mobile Security & Applications....”
Get full text
Перейти в каталог НБ ТГУ
eBook -
3Published in Springer eBooks (2014)Table of Contents: “...Cryptography -- Social network security -- Mobile security -- Network security -- Future...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
4Published in Springer eBooks (2015)Table of Contents: “... Cryptography -- Authentication -- Attribute-Based Encryption -- Mobile Security.- Theory -- Implementation...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
5Published in Springer eBooks (2015)Table of Contents: “...Malware detection -- Mobile security -- Vulnerability analysis -- Applied cryptography -- Network...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
6Published in Springer eBooks (2015)Table of Contents: “... and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
7
-
8
-
9Published in Springer eBooks (2014)Table of Contents: “...Intrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
10Published in Springer eBooks (2013)Table of Contents: “...-Based Low Power, Lossy Networks -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
11Published in Springer eBooks (2014)Table of Contents: “... -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
12
-
13
-
14
-
15
-
16
-
17
-
18Published in Springer eBooks (2013)Table of Contents: “... of Queries -- Network, Web, and Mobile Security -- A Probabilistic Framework for Distributed Localization...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
19
-
20