This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيد
This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
اقرأ المزيد
The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
اقرأ المزيد
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
اقرأ المزيد
The book addressed span a wide range of problems and solutions associated with the teaching of programming such as introductory ...
اقرأ المزيد
It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
اقرأ المزيد
This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
اقرأ المزيد
The book present original research in the field of service oriented computing, from theoretical and foundational results ...
اقرأ المزيد
This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...
اقرأ المزيد
The book is organized in topical sections on assistive technology to improve quality of life for older adults and their caregivers; ...
اقرأ المزيد
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
This book covers the area of convergence of software proofing and testing and feature current research work that combines ...
اقرأ المزيد
This book begins with an algorithm–a set of IF…THEN rules used in the development of a new, ethical, video surveillance ...
اقرأ المزيد
This book, in conjunction with the volume LNAI 5288, constitutes the refereed proceedings of theFirst World Summit, WSKS ...
اقرأ المزيد
The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
اقرأ المزيد
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيد
The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
اقرأ المزيد
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
اقرأ المزيد