This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied ...
اقرأ المزيدThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيدThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيدAims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...
اقرأ المزيدBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
اقرأ المزيدThis book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...
اقرأ المزيدThis book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
اقرأ المزيدAs society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
اقرأ المزيدThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيدThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيدThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
اقرأ المزيدThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد