This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
اقرأ المزيد
this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
اقرأ المزيد
With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
اقرأ المزيد
With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
اقرأ المزيد
Aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...
اقرأ المزيد
Provides a structured, industry-independent and at the same time practical insight into all types of business partnerships. ...
اقرأ المزيدThe global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication ...
اقرأ المزيد
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
اقرأ المزيد
This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
اقرأ المزيد
Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
اقرأ المزيد
Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th International Workshop on Databases in Networked Information Systems, ...
اقرأ المزيد
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
اقرأ المزيد
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
اقرأ المزيد
This book provides knowledge for cost savings and business improvement as well as new technical solutions. Composed of over ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
اقرأ المزيد
In this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...
اقرأ المزيد
Provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, ...
اقرأ المزيد