Electronic Books

Total Books: 1 - 20 /108
Abstract State Machines, B and Z : First International Conference, ABZ 2008, London, UK, September 16-18, 2008. Proceedings

This book constitutes the refereed proceedings of the First International Conference of Abstract State Machines, B and Z, ...

Weiterlesen
Access Control Models and Architectures For IoT and Cyber Physical Systems / Maanak Gupta, Smriti Bhatt, Asma Hassan Alshehri, Ravi Sandhu

Presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, ...

Weiterlesen
Access Control Systems

Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations ...

Weiterlesen
Ad-Hoc, Mobile, and Wireless Networks

The sixth international conference on AD-HOC NetwOrks and Wireless was held in the city of Morelia, Michoacan State, Mexico. ...

Weiterlesen
Ad-Hoc, Mobile, and Wireless Networks (vol. # 4104)

The 5th International Conference on Adhoc, Mobile and Wireless Networks (Adhoc-Now 2006) was held during August 17–19, ...

Weiterlesen
Advances in Computer Science – ASIAN 2007. Computer and Network Security

This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...

Weiterlesen
Advances in Computer Science – ASIAN 2007. Computer and Network Security

This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...

Weiterlesen
Advances in Data Mining

This book constitutes the proceedings of the Industrial Conference on Data Mining ICDM-Leipzig was the fourth meeting in ...

Weiterlesen
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...

Weiterlesen
Applied Cryptography and Network Security

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...

Weiterlesen
Applied Cryptography and Network Security

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...

Weiterlesen
Applied Cryptography and Network Security

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...

Weiterlesen
Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings

This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied ...

Weiterlesen
Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...

Weiterlesen
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

Weiterlesen
Communications and Multimedia Security (vol. # 3677)

This book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...

Weiterlesen
Computational Forensics : Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008. Proceedings

This book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, ...

Weiterlesen
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Weiterlesen
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

Weiterlesen
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

Weiterlesen
Total Books: 1 - 20 /108