This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
اقرأ المزيدThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيدConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
اقرأ المزيدThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
اقرأ المزيدThis book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
اقرأ المزيدThis book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
اقرأ المزيدIt is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...
اقرأ المزيدOn behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
اقرأ المزيدThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
اقرأ المزيدThis book discusses the application of molecular biology in resource science and authentication of traditional Chinese medicine ...
اقرأ المزيدThis book constitutes the refereed proceedings of the International Workshop on Multimedia Content Representation, Classification ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the First International CLEAR 2006 Evaluation Campaign ...
اقرأ المزيدThis book constitutes the thoroughly refereed joint post-workshop proceedings of two co-located events: the Second International ...
اقرأ المزيدConstitutes the refereed proceedings of the 6th International Workshop on Multiple Classifier Systems, MCS 2005. This book ...
اقرأ المزيدThis book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...
اقرأ المزيدNetwork-Aware Security for Group Communications fills a growing need in the research community for a reference that describes ...
اقرأ المزيدThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
اقرأ المزيد