This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Continue reading
The text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
Continue reading
The text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
Continue reading
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
Continue reading
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue reading
This book constitutes the proceedings of the 15th International Computer Science Symposium in Russia, CSR 2020, held in Yekaterinburg, ...
Continue reading
These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue reading
This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue reading
Provides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
Continue reading
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Continue reading
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
This book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative ...
Continue reading
The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue reading
The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Continue reading
This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue reading
This was the second time that a satellite workshop,solely devoted to medical image analysis issues, was held in conjunction ...
Continue reading
This book constitutes the refereed proceedings of the 6th International Conference on Computer Vision Systems, ICVS 2008, ...
Continue reading