The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
Continue reading
This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Continue reading
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Continue reading
This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Continue reading
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue reading