Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
اقرأ المزيد
                In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...
اقرأ المزيد
                Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...
اقرأ المزيد
                Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
اقرأ المزيد
                SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
اقرأ المزيد
                Semantics will have an important role to play in the future development of software systems and domain specific languages, ...
اقرأ المزيد
                This book constitutes the thoroughly refereed post-proceedings of the Second International Service Availability Symposium, ...
اقرأ المزيد
                This book constitutes the thoroughly refereed post-proceedings of the Third International Service Availability Symposium, ...
اقرأ المزيد
                The book is organized in topical sections on enterprise system dependability, software service availability, service availability ...
اقرأ المزيد
                The book present original research in the field of service oriented computing, from theoretical and foundational results ...
اقرأ المزيد
                Microsoft SharePoint Portal Server 2003 and Windows SharePoint Services address a variety of information-sharing and collaboration ...
اقرأ المزيد
                Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
اقرأ المزيد
                This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...
اقرأ المزيد
                This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...
اقرأ المزيد
                This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Grid and Internet of Things, ...
اقرأ المزيد
                The book is organized in topical sections on assistive technology to improve quality of life for older adults and their caregivers; ...
اقرأ المزيد
                This book presents the contributions of participants of the Advanced Research Workshop “Smart Materials for Energy, Communications ...
اقرأ المزيد
                Presents analytic and operational software tools that offer features for enhancing and streamlining interactions with customers. ...
اقرأ المزيد
                The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدFrom the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...
اقرأ المزيد