This book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingIt explores the diverse phenomena which are challenging the international law of the sea today, using the unique perspective ...
Continue readingThis volume of the AIDA Europe Research Series on Insurance Law and Regulation brings together contributions from authors ...
Continue readingThis book delivers a thorough and essential analysis of current economic policy, transformation and legislative changes in ...
Continue readingThe non-interference perspective is common when theorizing about the protection of the private life of individuals and their ...
Continue readingScience has development from a self-evident public good to being highly valued in other contexts for different reasons: strengthening ...
Continue readingThe Waste Market undertakes the interesting task of examining the creative ways in which a handful of European countries, ...
Continue readingTCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Continue readingThis book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...
Continue readingThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Continue readingThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Continue readingInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue readingThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Continue readingThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Continue reading