الكتب الالكترونية

عدد الكتب: 1 - 16 /16
978-3-540-73547-2
Autonomic and Trusted Computing

To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...

اقرأ المزيد
978-3-540-73547-2
Autonomic and Trusted Computing

To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...

اقرأ المزيد
978-3-540-38622-3
Autonomic and Trusted Computing

This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ...

اقرأ المزيد
978-3-540-69084-9
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

اقرأ المزيد
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

اقرأ المزيد
978-3-540-73538-0
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

اقرأ المزيد
978-3-540-73538-0
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

اقرأ المزيد
978-1-78561-928-1
Frontiers in Hardware Security and Trust: Theory, design and practice

The footprint and power constraints imposed on internet-of-things end-points, smart sensors, mobile and ad hoc network devices ...

اقرأ المزيد
978-3-8348-9195-2
ISSE 2006 — Securing Electronic Busines Processes

This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...

اقرأ المزيد
978-3-540-79499-8
Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...

اقرأ المزيد
978-3-540-85538-5
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

اقرأ المزيد
978-0-387-23462-5
Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...

اقرأ المزيد
978-0-387-25660-3
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-3-540-32040-1
Trust Management (vol. # 3477)

The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...

اقرأ المزيد
978-3-540-68979-9
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

اقرأ المزيد
978-0-387-23917-0
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

اقرأ المزيد
عدد الكتب: 1 - 16 /16