The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThis book states that the endemic societal faultlines of our times are deeply intertwined and that they confront us with ...
اقرأ المزيدThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
اقرأ المزيدThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيدThis second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيدThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيدThe Central Asian republics and neighboring countries are currently experiencing these problems - problems that will become ...
اقرأ المزيدThis book features various studies on democratization, transformation, political and economic development, and security ...
اقرأ المزيدThis book examines India’s economic development, agricultural production, and nutrition through the lens of a “Food Systems ...
اقرأ المزيدInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
اقرأ المزيدThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
اقرأ المزيدThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThis book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business ...
اقرأ المزيدThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
اقرأ المزيدThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
اقرأ المزيد“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
اقرأ المزيدThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
اقرأ المزيدThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
اقرأ المزيد