This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Continue readingThe text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
Continue readingThe text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
Continue readingThis book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
Continue readingThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue readingThis book constitutes the proceedings of the 15th International Computer Science Symposium in Russia, CSR 2020, held in Yekaterinburg, ...
Continue readingThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue readingThis book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue readingProvides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
Continue readingComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Continue readingThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Continue readingThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue readingThis was the second time that a satellite workshop,solely devoted to medical image analysis issues, was held in conjunction ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Computer Vision Systems, ICVS 2008, ...
Continue reading