Languages
          
        
        
      Mauw, Sjouke.
Overview
            | Works: | 0 works in 1 publications in 1 languages | |
|---|---|---|
Titles
          
                  
                    Trust Management X = 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings /
                  
                  by: 
                  Habib, Sheikh Mahbub.; Mühlhäuser, Max.; SpringerLink (Online service); Vassileva, Julita.; Mauw, Sjouke.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Graphical models for security = second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
                  
                  by: 
                  Jajodia, Sushil.; SpringerLink (Online service); Mauw, Sjouke.; Kordy, Barbara.; Workshop on the Preservation of Stability under Discretization ((2001 :)
                  (Language materials, printed)
                  
                  
                
                  
                    Security and Trust Management = 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings /
                  
                  by: 
                  Mauw, Sjouke.; SpringerLink (Online service); Conti, Mauro.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Graphical Models for Security = Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers /
                  
                  by: 
                  Mauw, Sjouke.; SpringerLink (Online service); Jajodia, Sushil.; Kordy, Barbara.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Public Key Infrastructure = 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings /
                  
                  by: 
                  Workshop on the Preservation of Stability under Discretization ((2001 :); Mjolsnes, Stig F.; Katsikas, Sokratis K.; Mauw, Sjouke.; SpringerLink (Online service)
                  (Language materials, printed)
                  
                  
                
                  
                    Graphical Models for Security = 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /
                  
                  by: 
                  Mauw, Sjouke.; Liu, Peng.; SpringerLink (Online service); Stolen, Ketil.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                
          Subjects
          
            
              
                Computer organization.
              
            
              
                Systems and Data Security.
              
            
              
                Artificial intelligence.
              
            
              
                Computer Communication Networks.
              
            
              
                Public key infrastructure (Computer security)
              
            
              
                Software engineering.
              
            
              
                Computer networks
              
            
              
                Information Systems Applications (incl. Internet).
              
            
              
                Computer Science.
              
            
              
                Computer programming.
              
            
              
                Programming Techniques.
              
            
              
                Computers and civilization.
              
            
              
                Computer Systems Organization and Communication Networks.
              
            
              
                Information Systems Applications (incl.Internet)
              
            
              
                Information Systems Applications (incl. Internet)
              
            
              
                Logics and Meanings of Programs.
              
            
              
                Algorithms.
              
            
              
                Management of Computing and Information Systems.
              
            
              
                Computer communication systems.
              
            
              
                Computer security
              
            
              
                Application software.
              
            
              
                Information Systems and Communication Service.
              
            
              
                e-Commerce/e-business.
              
            
              
                Artificial Intelligence.
              
            
              
                Computers and Society.
              
            
              
                Computing Milieux.
              
            
              
                Information Storage and Retrieval.
              
            
              
                Computers.
              
            
              
                Public key cryptography
              
            
              
                Data encryption (Computer science)
              
            
              
                E-commerce.
              
            
              
                Computer security.
              
            
              
                Software Engineering.
              
            
              
                Algorithm Analysis and Problem Complexity.
              
            
              
                Computer logic.
              
            
              
                Data Encryption.