 
                This book talks about how the regulatory agencies and courts in the United States, European Union and India are dealing with ...
اقرأ المزيد 
                This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...
اقرأ المزيد 
                It is expected that uncovered corporate fraud negatively affects the public reputation, and financial performance of fraudulent ...
اقرأ المزيد 
                This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيد 
                Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
اقرأ المزيد 
                Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد 
                This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيد 
                This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...
اقرأ المزيد 
                The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
اقرأ المزيد 
                Thepresentvolumecontainsthepost-proceedingsofthe4thInternationalWo- shop on Formal Aspects in Security and Trust (FAST2006). ...
اقرأ المزيد 
                This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security ...
اقرأ المزيد 
                The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...
اقرأ المزيد 
                This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy ...
اقرأ المزيد 
                The footprint and power constraints imposed on internet-of-things end-points, smart sensors, mobile and ad hoc network devices ...
اقرأ المزيد 
                The book describes and analyzes the formation, operation, and impacts of modern global cartels. It provides a broad picture ...
اقرأ المزيد