الكتب الالكترونية

عدد الكتب: 41 - 60 /218
978-3-030-61638-0
Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings

This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied ...

اقرأ المزيد
978-981-15-8101-4
Artificial Intelligence and Security

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

اقرأ المزيد
978-981-15-8083-3
Artificial Intelligence and Security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

اقرأ المزيد
978-3-540-73547-2
Autonomic and Trusted Computing

To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...

اقرأ المزيد
978-3-540-73547-2
Autonomic and Trusted Computing

To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...

اقرأ المزيد
978-3-540-69295-9
Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...

اقرأ المزيد
978-1-4302-0204-2
Beginning Information Cards and Cardspace

If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability ...

اقرأ المزيد
978-3-540-47917-8
Biometric Authentication

Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral ...

اقرأ المزيد
978-0-387-28094-3
Biometric User Authentication for IT Security

Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological ...

اقرأ المزيد
978-3-540-35482-6
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

اقرأ المزيد
978-3-030-25540-4
Computer Aided Verification ; 31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I

This volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...

اقرأ المزيد
978-3-540-75187-8
Computer Algebra in Scientific Computing

The book covers not only various expanding applications of computer algebra to scientific computing but also the computer ...

اقرأ المزيد
978-3-540-75187-8
Computer Algebra in Scientific Computing

The book covers not only various expanding applications of computer algebra to scientific computing but also the computer ...

اقرأ المزيد
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

اقرأ المزيد
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

اقرأ المزيد
978-3-540-31998-6
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

اقرأ المزيد
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

اقرأ المزيد
978-3-540-77272-9
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

اقرأ المزيد
978-3-540-77272-9
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

اقرأ المزيد
978-3-030-65411-5
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
عدد الكتب: 41 - 60 /218