Electronic Books

Total Books: 21 - 40 /84
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Continue reading
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Continue reading
9780367515027
Corporate Brand Design : Developing and Managing Brand Identity / Mohammad Mahdi Foroudi, Pantea Foroudi

Corporate Brand Design offers a unique and comprehensive exploration of the relationship between companies, their brand design ...

Continue reading
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

Continue reading
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

Continue reading
978-3-540-71285-5
Differential Equations Driven by Rough Paths

The goal of these notes is to provide a straightforward and self supporting but minimalist account of the key results forming ...

Continue reading
978-3-540-35999-9
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

Continue reading
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Continue reading
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Continue reading
978-3-540-46088-6
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Continue reading
978-3-540-31680-0
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

Continue reading
978-3-540-46256-9
Financial Cryptography and Data Security (vol. # 4107)

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...

Continue reading
978-3-540-85230-8
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

Continue reading
978-3-540-73814-5
Frontiers in Algorithmics

This book constitutes the refereed proceedings of the First Annual International Frontiers of Algorithmics Workshop, FAW ...

Continue reading
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Continue reading
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Continue reading
978-3-540-38343-7
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Continue reading
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

Continue reading
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

Continue reading
978-3-540-72354-7
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

Continue reading
Total Books: 21 - 40 /84