This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Continue reading
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Continue reading
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on ...
Continue reading
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Continue reading
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
Continue reading
We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
Continue reading
This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
Continue reading
This classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Continue reading
All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
Continue reading
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue reading
Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Continue reading
Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...
Continue reading
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Continue reading
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue reading