Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
Continue readingThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue readingThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue readingThe 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Continue readingAdvances in automation for electronic commerce require improved understanding and formalization of the objects, processes, ...
Continue readingIf you're a reasonably experienced Flash user who has mastered the basics but wants to empower your SWFs, taking them further ...
Continue readingThis book constitutes the refereed proceedings of the 8th Asia-Pacific Web Conference, APWeb 2006, held in Harbin, China ...
Continue readingThis book examines perceptions and dialogues between China and Europe by analysing strategic geopolitical sites which fostered ...
Continue readingGoliath Strikes Back: How Traditional Retailers Are Winning Back Customers from Ecommerce Startups expands on this current ...
Continue readingThis volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...
Continue readingBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
Continue readingConstitutes the refereed proceedings of the Second International Workshop on Human Interactive Proofs, HIP 2005, held in ...
Continue readingUnravels and provides business managers and scholars with new development in managing the ever-increasing global and advance ...
Continue readingThe explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled ...
Continue readingService-oriented computing has become one of the predominant factors in IT research and development efforts over the last ...
Continue readingThis updated edition of Information Assurance: Security in the Information Environment was written to help IT managers and ...
Continue readingA Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...
Continue readingThe large-scale and almost ubiquitous availability of information has become as much of a curse as it is a blessing. The ...
Continue reading