This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Continue readingThis book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Continue readingFor 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
Continue readingThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
Continue readingThis book constitutes the refereed proceedings of the 19th International Conference on Database and Expert Systems Applications, ...
Continue readingIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
Continue readingThis book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...
Continue readingThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Continue readingThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Continue readingThis book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication ...
Continue readingThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Continue readingThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Continue readingThis book provides in-depth analysis of the wide range of ethical issues associated with drug-resistant infectious diseases.
Continue readingThis book presents the position that the online environment is a significant and relevant theater of activity in the fight ...
Continue readingThis book provides the first in-depth analysis of the economics and regulation of financial privacy. It is an international ...
Continue readingThepresentvolumecontainsthepost-proceedingsofthe4thInternationalWo- shop on Formal Aspects in Security and Trust (FAST2006). ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security ...
Continue reading