Electronic Books

Total Books: 41 - 60 /74
978-3-540-88871-0
On the Move to Meaningful Internet Systems: OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I

This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...

Continue reading
978-3-540-79576-6
Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...

Continue reading
978-3-540-88403-3
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Continue reading
978-3-030-17138-4
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Continue reading
978-3-540-70630-4
Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...

Continue reading
978-981-16-3049-1
Privacy and Data Protection in Software Services

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...

Continue reading
978-3-540-87471-3
Privacy in Statistical Databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings

Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...

Continue reading
978-3-540-78478-4
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

Continue reading
978-0-387-70992-5
Privacy-Preserving Data Mining:Models and Algorithms

Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...

Continue reading
978-0-387-09699-5
Proceedings of The IFIP Tc 11 23 "rd" International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Continue reading
978-3-540-68164-9
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Continue reading
978-3-540-89754-5
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Continue reading
978-3-540-88733-1
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...

Continue reading
978-3-540-87403-4
Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings

This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...

Continue reading
978-3-540-88353-1
Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...

Continue reading
978-3-540-85855-3
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Continue reading
978-0-387-72442-3
Security for Telecommunications Networks

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...

Continue reading
978-3-319-60774-0
Security of Networks and Services in an All-Connected World

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...

Continue reading
978-3-030-10591-4
Security of Ubiquitous Computing Systems Selected Topics

T this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...

Continue reading
978-3-540-85893-5
Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings

This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...

Continue reading
Total Books: 41 - 60 /74