Electronic Books

Total Books: 21 - 40 /77
978-3-540-70567-3
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

Continue reading
978-3-319-78461-8
Data-Driven Policy Impact Evaluation

This book provides statistical tools for evaluating the effects of public policies advocated by governments and public institutions. ...

Continue reading
978-3-540-34642-5
Emerging Trends in Information and Communication Security

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication ...

Continue reading
978-1-84628-659-9
Ethical and Social Issues in the Information Age

This book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...

Continue reading
978-1-84628-659-9
Ethical and Social Issues in the Information Age

This book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...

Continue reading
978-3-540-46088-6
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Continue reading
978-3-540-77366-5
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Continue reading
978-3-540-77366-5
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Continue reading
978-3-540-85230-8
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

Continue reading
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Continue reading
978-3-540-30114-1
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

Continue reading
978-3-540-31481-3
Information Hiding (vol. # 3727)

Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...

Continue reading
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Continue reading
978-3-540-77535-5
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Continue reading
978-3-540-71093-6
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

Continue reading
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

Continue reading
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

Continue reading
978-3-540-47719-8
Information Security and Privacy

A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...

Continue reading
978-3-540-73458-1
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

Continue reading
978-3-540-35459-8
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

Continue reading
Total Books: 21 - 40 /77