-
1por Quality of Protection Workshop“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
2por ACM Workshop on Recurring Malcode“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
3por ACM Workshop on Storage Security and Survivability“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
4por ACM Workshop on Digital Rights Management“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
5por ACM Workshop on Formal Methods in Security Engineering“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
6por ACM Workshop on Scalable Trusted Computing“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
7por ACM Computer Security Architecture Workshop“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
8por ACM Workshop on Secure Web Services“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
9por ACM Workshop on Digital Identity Management“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico -
10por ACM Workshop on Privacy in the Electronic Society“…14th ACM Conference on Computer and Communications Security 2007…”
Publicado 2007
Libro electrónico