This book cover theory, practice, applications, and experiences related to secure software.
Continue reading
This book cover theory, practice, applications, and experiences related to secure software.
Continue reading
All aspects of the conference were managed on-line; not only the reviewing, submissions and registration processes; but also ...
Continue reading
This book constitutes the refereed proceedings of the 9th Pacific Rim Conference on Multimedia, PCM 2008, held in Tainan, ...
Continue reading
This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue reading
This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue reading
To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
Continue reading
To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
Continue reading
This book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...
Continue reading
Scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...
Continue reading
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue reading
The objective of this volume is to offer the excellent presentations to the public, and to promote the study exchange among ...
Continue reading
The objective of this volume is to offer the excellent presentations to the public, and to promote the study exchange among ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
Continue reading
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...
Continue reading
This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Continue reading
The workshop gives a snapshot of the current wor- wide research in multimedia analysis. Through recent advances in computing, ...
Continue reading
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Continue reading
Peer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...
Continue reading
This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
Continue reading