Computer Security -- ESORICS 2013
Download and listen anywhere
Download your favorite episodes and enjoy them, wherever you are! Sign up or log in now to access offline listening.
Computer Security -- ESORICS 2013
This is an automatically generated transcript. Please note that complete accuracy is not guaranteed.
Description
The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers discuss topics like developing protocols for secure multi-party computation, designing...
show moreYou can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Computer-Security-ESORICS-2013-Proceedings/dp/364240202X?&linkCode=ll1&tag=cvthunderx-20&linkId=227f22cf34c4fa11f381b42bcb0c4418&language=en_US&ref_=as_li_ss_tl
Information
Author | CyberSecurity Summary |
Organization | CyberSecurity Summary |
Website | - |
Tags |
Copyright 2024 - Spreaker Inc. an iHeartMedia Company