Electronic Books

Total Books: 461 - 480 /571
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results ...

Weiterlesen
NoIMG
Secure Mobile Ad-hoc Networks and Sensors

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...

Weiterlesen
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Weiterlesen
Secure and Smart Internet of Things (IoT) Using Blockchain and AI / Ahmed Banafa

Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...

Weiterlesen
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Weiterlesen
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

Weiterlesen
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 3813)

It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor ...

Weiterlesen
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Weiterlesen
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Weiterlesen
Security in Ad-hoc and Sensor Networks

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, ...

Weiterlesen
Security in Computer and Information Sciences

This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...

Weiterlesen
Security in IoT : The Changing Perspective / Rituparna Chaki, Debdutta Barman Roy

It will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...

Weiterlesen
Security in Pervasive Computing (vol. # 3450)

The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...

Weiterlesen
Security in Pervasive Computing (vol. # 3934)

This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), ...

Weiterlesen
Selected Areas in Cryptography

Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...

Weiterlesen
Self-Managed Networks, Systems, and Services

This book constitutes the refereed proceedings of the Second IEEE International Workshop on Self-Managed Networks, Systems, ...

Weiterlesen
Self-Stabilizing Systems

Constitutes the proceedings of the 7th International Symposium on Self-Stabilizing Systems, held in Barcelona, Spain, in ...

Weiterlesen
Sequences, Subsequences, and Consequences

These are the proceedings of the Workshop on Sequences, Subsequences, and Consequences that was held at the University of ...

Weiterlesen
Service-Oriented Computing: Agents, Semantics, and Engineering

This book constitutes the refereed proceedings of the International Workshop on Service-Oriented Computing: Agents, Semantics, ...

Weiterlesen
Smart Technologies for Precision Assembly 9th IFIP WG 5.5 International Precision Assembly Seminar, IPAS 2020, Virtual Event, December 14–15, 2020, Revised Selected Papers

This book constitutes the refereed post-conference proceedings of the 9th IFIP WG 5.5 International Precision Assembly Seminar, ...

Weiterlesen
Total Books: 461 - 480 /571