The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
اقرأ المزيد
This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
اقرأ المزيد
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
اقرأ المزيد
This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
اقرأ المزيد