This book cover theory, practice, applications, and experiences related to secure software.
Continue readingThis book cover theory, practice, applications, and experiences related to secure software.
Continue readingAll aspects of the conference were managed on-line; not only the reviewing, submissions and registration processes; but also ...
Continue readingThis book constitutes the refereed proceedings of the 9th Pacific Rim Conference on Multimedia, PCM 2008, held in Tainan, ...
Continue readingThis book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue readingThis book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue readingTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
Continue readingTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
Continue readingThis book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...
Continue readingScientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...
Continue readingThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue readingThe objective of this volume is to offer the excellent presentations to the public, and to promote the study exchange among ...
Continue readingThe objective of this volume is to offer the excellent presentations to the public, and to promote the study exchange among ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
Continue readingThe inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...
Continue readingThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Continue readingThe workshop gives a snapshot of the current wor- wide research in multimedia analysis. Through recent advances in computing, ...
Continue readingMultimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Continue readingPeer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...
Continue readingThis book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
Continue reading