Recent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...
WeiterlesenNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
WeiterlesenIn the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...
WeiterlesenOrganizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...
WeiterlesenDesign and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
WeiterlesenSemantics will have an important role to play in the future development of software systems and domain specific languages, ...
WeiterlesenThis book constitutes the thoroughly refereed post-proceedings of the Second International Service Availability Symposium, ...
WeiterlesenThe book is organized in topical sections on enterprise system dependability, software service availability, service availability ...
WeiterlesenThe book present original research in the field of service oriented computing, from theoretical and foundational results ...
WeiterlesenMicrosoft SharePoint Portal Server 2003 and Windows SharePoint Services address a variety of information-sharing and collaboration ...
WeiterlesenSmart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
WeiterlesenThis book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...
WeiterlesenThis book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...
WeiterlesenThis book constitutes the refereed proceedings of the Third EAI International Conference on Smart Grid and Internet of Things, ...
WeiterlesenThis book presents the contributions of participants of the Advanced Research Workshop “Smart Materials for Energy, Communications ...
WeiterlesenThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
WeiterlesenFrom the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...
WeiterlesenIn this book, we first provide an overview of thecentral issue of social security and will then take a close look at social ...
WeiterlesenThis volume contains papers presented at the first joint conference of the Software Pr- ess Workshop and the International ...
WeiterlesenWe have selected two themes for this conference . Our ?rst theme, “production of attractive and reliable software at Internet ...
Weiterlesen