This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 27th International Conference on Conceptual Modeling, ER 2008, held ...
اقرأ المزيدThis comprehensive volume the inclusion of several case studies serves to examine pertinent topics, namely computer-based ...
اقرأ المزيدUnveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
اقرأ المزيدModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدThis book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
اقرأ المزيدThis book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
اقرأ المزيدConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
اقرأ المزيدThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
اقرأ المزيدThis book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on ...
اقرأ المزيدConstitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
اقرأ المزيدFor 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
اقرأ المزيدThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيدThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
اقرأ المزيدData Stream Mining and Resource Adaptive Computation.- Purpose Based Access Control for Privacy Protection in Database Systems.- ...
اقرأ المزيدDEXA 2005, the 16th International Conference on Database and Expert Systems Applications, was held at the Copenhagen Business ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 19th International Conference on Database and Expert Systems Applications, ...
اقرأ المزيد