Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
Weiterlesen
This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...
Weiterlesen
This book constitutes the refereed proceedings of the Second International Conference MCO 2008, Metz, France, September 2008.The ...
Weiterlesen
This book constitutes the thoroughly refereed post-proceedings of 11 international workshops held as satellite events of ...
WeiterlesenThis book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...
Weiterlesen
Molecular Mechanisms of Plant and Microbe Coexistence presents studies on the complex and manifold interactions of plants ...
Weiterlesen
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
WeiterlesenMedia forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
Weiterlesen
Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Weiterlesen
Oz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting ...
Weiterlesen
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Weiterlesen
This book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking ...
Weiterlesen
This book surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together ...
Weiterlesen
Nanotechnology is one of the fastest growing technological fields of the 21st century. Nanotechnologies will impact numerous ...
Weiterlesen
provides a comprehensive analysis of national security exceptions in international trade and investment agreements. The subject ...
Weiterlesen
Net-Centric Approaches to Intelligence and National Security considers the web architectures and recent developments that ...
Weiterlesen
This volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...
Weiterlesen
Provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s ...
Weiterlesen
These proceedings contain the papers presented at the 2005 IFIP International Conference on Network and Parallel Computing ...
Weiterlesen
The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas ...
Weiterlesen