This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied ...
اقرأ المزيد
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيد
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيد
Aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...
اقرأ المزيد
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
اقرأ المزيد
This book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...
اقرأ المزيد
This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
اقرأ المزيد
As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
اقرأ المزيد
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيد
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيد
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
اقرأ المزيد
These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
اقرأ المزيد
The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيد
The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيد
Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد