This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ...
Continue readingThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Continue readingConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Continue readingThis book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
Continue readingThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Continue reading