This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
اقرأ المزيدThis book provides statistical tools for evaluating the effects of public policies advocated by governments and public institutions. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication ...
اقرأ المزيدThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
اقرأ المزيدThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
اقرأ المزيدThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيدThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
اقرأ المزيدThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
اقرأ المزيدAll papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
اقرأ المزيدConstitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
اقرأ المزيدComplete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
اقرأ المزيدConstitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...
اقرأ المزيدThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
اقرأ المزيدA Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...
اقرأ المزيدThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
اقرأ المزيدThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيد