Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Continue reading
Peer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...
Continue reading
McInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
Continue reading
This workshop was held in September 2004, in conjunction with the 2004 IEEE/WIC/ACM International Joint Conference on Web ...
Continue reading
This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Continue reading
The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Continue reading
Understand the essentials of the Snowflake Database and the overall Snowflake Data Cloud. This book covers how Snowflake’s ...
Continue reading
In this book, we first provide an overview of thecentral issue of social security and will then take a close look at social ...
Continue reading
This book provides an updated and fully revised 4th edition of this authoritative analysis of Swiss democracy. It particularly ...
Continue readingThis research paper examine the effect of leadership behaviors and transparent internal communication on knowledge sharing. ...
Continue reading
This book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument ...
Continue readingThis open access book considers the development of the sharing and collaborative economy with a European focus, mapping across ...
Continue reading
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Continue reading