This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Continue readingT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Continue readingRecent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...
Continue readingNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Continue readingIn the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...
Continue readingOrganizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...
Continue readingDesign and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
Continue readingSAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Continue readingSemantics will have an important role to play in the future development of software systems and domain specific languages, ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the Second International Service Availability Symposium, ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the Third International Service Availability Symposium, ...
Continue readingThe book is organized in topical sections on enterprise system dependability, software service availability, service availability ...
Continue readingThe book present original research in the field of service oriented computing, from theoretical and foundational results ...
Continue readingLiberalisation of cross-border service provision developed into one of the most controversial European integration issues. ...
Continue readingMicrosoft SharePoint Portal Server 2003 and Windows SharePoint Services address a variety of information-sharing and collaboration ...
Continue readingThis is the best book we have about the methodology to conduct research on the second generation or the children of immigrants ...
Continue readingThis book provides a thorough update on Sjögren’s syndrome (SS) and its adverse impacts on oral health. The opening section ...
Continue readingRecent history reveals both that the large-scale reforestation projects of the 20th century have often been less successful ...
Continue readingSmart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
Continue readingThis book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...
Continue reading