The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue readingThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue readingThis State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing ...
Continue readingThe book presented at the symposium focused on topics related to these three events and to artificial intelligence and robotics ...
Continue readingThis book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
Continue readingThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Continue readingThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Continue readingThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Continue readingThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Continue readingThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
Continue readingThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
Continue readingTelecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...
Continue readingThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Continue readingThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Continue readingThis book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
Continue readingSemantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. ...
Continue readingThe book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
Continue readingThis book cover topics such as: web semantics and linked (open) data; machine learning and deep learning techniques; semantic ...
Continue readingThis book presented original contributions demonstrating the use of logic, discrete mathematics, combinatorics, domain theory ...
Continue readingThe book features valuable discussions of relevant concepts that examine the various approaches which define emerging theoretical ...
Continue reading