This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
اقرأ المزيد
This volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...
اقرأ المزيد
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
اقرأ المزيد
This tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
اقرأ المزيد
Provides expert guidance and valuable insights on getting the most out of Big Data systems. Helps readers understand how ...
اقرأ المزيد
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد
Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and Networking, ...
اقرأ المزيد
This book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...
اقرأ المزيد
Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
This book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies ...
اقرأ المزيد
This book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
اقرأ المزيد
This book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيد
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيد