Electronic Books

Total Books: 201 - 220 /342
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

Weiterlesen
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Weiterlesen
New Trends in Computational Vision and Bio-inspired Computing

Gathers selected, peer-reviewed original contributions presented at the International Conference on Computational Vision ...

Weiterlesen
Next Generation Information Technologies and Systems

The selected papers may be classified roughly in ten broad areas: ? Information systems development ? Distributed systems ...

Weiterlesen
Person-Centered Health Records

The book consists of three important sections. Section I addresses how the new person-centered system will change the way ...

Weiterlesen
Perspectives and Policies on ICT in Society

The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...

Weiterlesen
NoIMG
Perspectives on Digital Humanism

This book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...

Weiterlesen
Pervasive Computing

This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...

Weiterlesen
Pervasive Computing (vol. # 3468)

WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as ...

Weiterlesen
Pervasive Computing (vol. # 3968)

This book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, ...

Weiterlesen
Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...

Weiterlesen
NoIMG
Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security ...

Weiterlesen
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing reviews a series of methods that can precisely answer data cube-style ...

Weiterlesen
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Weiterlesen
Principles of Security and Trust

This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...

Weiterlesen
Privacy Enhancing Technologies

This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...

Weiterlesen
Privacy Enhancing Technologies (vol. # 3424)

Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...

Weiterlesen
Privacy Enhancing Technologies (vol. # 3856)

The papers in this volume represent the proceedings of the 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June ...

Weiterlesen
Total Books: 201 - 220 /342