This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ...
Continue reading
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Continue reading
Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
Continue reading
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Continue reading
This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
Continue reading
The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Continue reading