The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
Continue readingThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Continue readingTraditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Continue readingThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue reading