Electronic Books

Total Books: 181 - 200 /263
Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...

Weiterlesen
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Weiterlesen
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Weiterlesen
Privacy Enhancing Technologies (vol. # 4258)

The papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...

Weiterlesen
Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...

Weiterlesen
Privacy and Data Protection in Software Services

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...

Weiterlesen
Privacy in Statistical Databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings

Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...

Weiterlesen
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

Weiterlesen
Privacy-Preserving Data Mining:Models and Algorithms

Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...

Weiterlesen
Pro Oracle Application Express

Application Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...

Weiterlesen
Proceedings of The IFIP Tc 11 23 "rd" International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Weiterlesen
Progress in Cryptology - AFRICACRYPT 2020 : 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...

Weiterlesen
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

Weiterlesen
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

Weiterlesen
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

Weiterlesen
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Weiterlesen
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...

Weiterlesen
Quality of Information and Communications Technology

This book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...

Weiterlesen
Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings

This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...

Weiterlesen
Total Books: 181 - 200 /263