This edition guides the reader through successful planning and implementation of a thesis project and provides students in ...
Continue readingThe book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
Continue readingThis two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Continue readingThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Continue readingThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
Continue readingThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue readingThis book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
Continue readingVolume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
Continue readingthis volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
Continue readingThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Continue readingThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Continue readingThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Continue readingThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Continue readingThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue readingThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Continue readingProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Continue reading