The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue readingModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
Continue readingThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Continue readingThis volume comprises papers from the following ?ve workshops that were part of the complete program for the International ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Continue readingThis book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
Continue readingTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Continue readingThe purpose of the DEECS workshop is to provide an annual forum for exchange of state-of-the-art research and development ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 8th International Conference on Data Management Technologies ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
Continue readingData management systems play the most crucial role in building large application s- tems. Since modern applications are no ...
Continue readingOne of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Continue readingOne of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Continue readingThis book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...
Continue readingThis book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...
Continue readingThis book teaches data-parallel programming using C++ and the SYCL standard from the Khronos Group and walks through everything ...
Continue readingThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Continue readingThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Continue readingThis two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
Continue reading