The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
اقرأ المزيدThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيدThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
اقرأ المزيدThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيدQueuing Theory and Telecommunications : Networks and Applications provides some fundamental knowledge in queuing theory, ...
اقرأ المزيدThe book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
اقرأ المزيدThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
اقرأ المزيدThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
اقرأ المزيدThe idea of reconfigurable hardware systems has represented the Holy Grail for computer system designers.It has been recognized ...
اقرأ المزيدThis book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...
اقرأ المزيدThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
اقرأ المزيدThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
اقرأ المزيدThis State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing ...
اقرأ المزيدThe book presented at the symposium focused on topics related to these three events and to artificial intelligence and robotics ...
اقرأ المزيدThis book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
اقرأ المزيدThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
اقرأ المزيدThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
اقرأ المزيدThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
اقرأ المزيدThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
اقرأ المزيدThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
اقرأ المزيد