The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue reading
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
Continue reading
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Continue reading
This volume comprises papers from the following ?ve workshops that were part of the complete program for the International ...
Continue reading
This book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Continue reading
This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
Continue readingTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Continue reading
The purpose of the DEECS workshop is to provide an annual forum for exchange of state-of-the-art research and development ...
Continue reading
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Data Management Technologies ...
Continue reading
This book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
Continue reading
Data management systems play the most crucial role in building large application s- tems. Since modern applications are no ...
Continue reading
One of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Continue reading
One of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Continue reading
This book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...
Continue reading
This book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...
Continue reading
This book teaches data-parallel programming using C++ and the SYCL standard from the Khronos Group and walks through everything ...
Continue reading
This two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Continue reading
This two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Continue reading
This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
Continue reading