This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
WeiterlesenThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
WeiterlesenThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
WeiterlesenThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
WeiterlesenThis book constitutes the refereed proceedings of the International Conference on Computer Vision and Graphics, ICCVG 2020, ...
WeiterlesenExplores the utilization of Internet of Things (IoT) with computer vision and its underlying technologies in different applications ...
WeiterlesenThis book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ...
WeiterlesenThesearetheproceedingsofthe21stInternationalSymposiumonComputerand ? Information Sciences (ISCIS 2006) held in Istanbul, ...
WeiterlesenThis book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...
WeiterlesenThis book constitutes revised selected papers of the First International Conference on Computing Science, Communication and ...
WeiterlesenZero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly ...
WeiterlesenConstituents of Modern System-safety Thinking contains the invited papers presented at the Thirteenth annual Safety-critical ...
WeiterlesenThis book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...
WeiterlesenThis book presents a cross-disciplinary insight and policy analysis into the effects of European legal and political frameworks ...
WeiterlesenHistory based access control and secure information flow The spec# programming system Mastering test generation from smart ...
WeiterlesenThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
WeiterlesenThe aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...
Weiterlesen