This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
WeiterlesenThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
WeiterlesenThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
WeiterlesenThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
WeiterlesenThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
WeiterlesenThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
WeiterlesenThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
WeiterlesenTelecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...
WeiterlesenThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
WeiterlesenThis book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
WeiterlesenSemantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. ...
WeiterlesenThe book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
WeiterlesenThis book cover topics such as: web semantics and linked (open) data; machine learning and deep learning techniques; semantic ...
WeiterlesenThis book presented original contributions demonstrating the use of logic, discrete mathematics, combinatorics, domain theory ...
WeiterlesenThe book features valuable discussions of relevant concepts that examine the various approaches which define emerging theoretical ...
WeiterlesenThe book is organized in topical sections on enterprise system dependability, software service availability, service availability ...
WeiterlesenThe book present original research in the field of service oriented computing, from theoretical and foundational results ...
WeiterlesenThe book address a range of topics at the intersection of service-oriented computing, semantic technology, and intelligent ...
WeiterlesenThis book presents research results on the application of advanced signal processing techniques for improving the value of ...
Weiterlesen