The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue readingThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
Continue readingThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Continue readingThis book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...
Continue readingThe Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. ...
Continue readingThis book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...
Continue readingThe 2007 NSF BioSurveillance Workshop (BioSurveillance 2007) was built on the success of the first NSF BioSurveillance Workshop, ...
Continue readingThis book presents a complete treatment of a new class of random processes, which have been studied intensively during the ...
Continue readingIntroduction to Contact Mechanics, Second Edition is a gentle introduction to the mechanics of solid bodies in contact for ...
Continue readingOn behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
Continue readingIrritant dermatitis is a common condition, accounting for a significant proportion of occupational skin disease. The recent ...
Continue readingThis volume presents the proceedings of the eighth Colloquium Crustacea Decapoda Mediterranea, which was held at the Ionian ...
Continue readingThis book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...
Continue readingThis open access book offers something for everyone working with market segmentation: practical guidance for users of market ...
Continue readingThis book reveals exciting early Christian evidence that Mary was remembered as a powerful role model for women leaders—women ...
Continue readingDiscusses the application of metaheuristic algorithms in a number of important optimization problems in civil engineering. ...
Continue readingPresents the structure of feedback control theory and to provide a sequence of exciting discoveries. The book demonstrates ...
Continue reading