الكتب الالكترونية

عدد الكتب: 21 - 40 /47
978-3-540-30582-8
Information Networking

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, ...

اقرأ المزيد
978-3-540-38343-7
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

اقرأ المزيد
978-3-540-31815-6
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

اقرأ المزيد
978-3-540-31979-5
Information Security Practice and Experience (vol. # 3439)

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...

اقرأ المزيد
978-3-540-32424-9
Information Security and Cryptology (vol. # 3822)

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...

اقرأ المزيد
978-3-540-47719-8
Information Security and Privacy

A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...

اقرأ المزيد
978-3-540-89862-7
Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-3-540-31645-9
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

اقرأ المزيد
978-3-540-30556-9
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

اقرأ المزيد
978-3-540-32278-8
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

اقرأ المزيد
978-3-540-76282-9
Rational, Robust, and Secure Negotiations in Multi-Agent Systems

This book addresses all aspects of negotiation mechanisms in multi-agent systems, including Multi-Issue Negotiations, Concurrent ...

اقرأ المزيد
978-3-540-31779-1
Recent Advances in Intrusion Detection (vol. # 3858)

This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...

اقرأ المزيد
978-3-540-39725-0
Recent Advances in Intrusion Detection (vol. # 4219)

This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...

اقرأ المزيد
978-3-540-75248-6
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

اقرأ المزيد
978-3-540-31974-0
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

اقرأ المزيد
978-3-540-38987-3
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

اقرأ المزيد
978-0-387-46276-9
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results ...

اقرأ المزيد
978-981-15-3654-0
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

اقرأ المزيد
978-3-540-31836-1
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

اقرأ المزيد
978-3-540-38081-8
Security and Cryptography for Networks

This volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...

اقرأ المزيد
عدد الكتب: 21 - 40 /47