Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Continue readingPeer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...
Continue readingMcInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
Continue readingThis workshop was held in September 2004, in conjunction with the 2004 IEEE/WIC/ACM International Joint Conference on Web ...
Continue readingThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Continue readingThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Continue readingUnderstand the essentials of the Snowflake Database and the overall Snowflake Data Cloud. This book covers how Snowflake’s ...
Continue readingIn this book, we first provide an overview of thecentral issue of social security and will then take a close look at social ...
Continue readingThis book provides an updated and fully revised 4th edition of this authoritative analysis of Swiss democracy. It particularly ...
Continue readingThis research paper examine the effect of leadership behaviors and transparent internal communication on knowledge sharing. ...
Continue readingThis book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument ...
Continue readingThis open access book considers the development of the sharing and collaborative economy with a European focus, mapping across ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Continue reading