Electronic Books

Total Books: 1 - 15 /15
Artificial Intelligence and Security

This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

Weiterlesen
Artificial Intelligence and Security

This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

Weiterlesen
Computational Intelligence and Security (vol. # 3802)

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on ...

Weiterlesen
Cryptology and Network Security (vol. # 4301)

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...

Weiterlesen
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

Weiterlesen
Digital Watermarking (vol. # 3304)

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...

Weiterlesen
Global E-Security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...

Weiterlesen
Guide to Efficient Software Design

This classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...

Weiterlesen
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

Weiterlesen
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

Weiterlesen
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

Weiterlesen
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) /

Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...

Weiterlesen
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

Weiterlesen
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

Weiterlesen
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

Weiterlesen
Total Books: 1 - 15 /15