The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
WeiterlesenThis book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...
WeiterlesenThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
WeiterlesenThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
WeiterlesenIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
WeiterlesenIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
WeiterlesenThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
WeiterlesenFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
WeiterlesenConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
WeiterlesenThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
WeiterlesenIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
WeiterlesenIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
WeiterlesenIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
WeiterlesenFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
WeiterlesenThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...
WeiterlesenGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
WeiterlesenThe 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...
WeiterlesenImage and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...
WeiterlesenThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
WeiterlesenThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Weiterlesen