Electronic Books

Total Books: 41 - 60 /123
978-3-540-37634-7
Discovering Mathematics with Magma

This volume celebrates the first decade of the Computer Algebra system Magma. With a design based on the ontology and semantics ...

Continue reading
978-3-540-37634-7
Discovering Mathematics with Magma

This volume celebrates the first decade of the Computer Algebra system Magma. With a design based on the ontology and semantics ...

Continue reading
978-3-540-32428-7
Distributed Computing – IWDC 2005

This book constitutes the refereed proceedings of the 7th International Workshop on Distributed Computing, IWDC 2004, held ...

Continue reading
978-0-387-68614-1
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

Continue reading
978-0-387-68614-1
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

Continue reading
978-0-387-44606-6
Electronic Postage Systems

This book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...

Continue reading
978-0-387-44606-6
Electronic Postage Systems

This book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...

Continue reading
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Continue reading
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Continue reading
978-3-540-46088-6
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Continue reading
978-3-540-31680-0
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

Continue reading
978-3-540-46256-9
Financial Cryptography and Data Security (vol. # 4107)

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...

Continue reading
978-3-540-85230-8
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

Continue reading
978-3-540-31847-7
Formal Methods in Software and Systems Modeling

By presenting state-of-the-art research results on various aspects of formal and visual modeling of software and systems, ...

Continue reading
978-3-540-73814-5
Frontiers in Algorithmics

This book constitutes the refereed proceedings of the First Annual International Frontiers of Algorithmics Workshop, FAW ...

Continue reading
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Continue reading
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Continue reading
978-3-540-38343-7
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Continue reading
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

Continue reading
978-3-540-77535-5
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Continue reading
Total Books: 41 - 60 /123