This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue readingThis second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue readingThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue readingThe Central Asian republics and neighboring countries are currently experiencing these problems - problems that will become ...
Continue readingThis book features various studies on democratization, transformation, political and economic development, and security ...
Continue readingThis book examines India’s economic development, agricultural production, and nutrition through the lens of a “Food Systems ...
Continue readingThis book explores the transformative experiences of participants in the University of Sydney’s National Centre for Cultural ...
Continue readingThis volume explores modern concepts of trophic and guild interactions among natural enemies in natural and agricultural ...
Continue readingInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue readingThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Continue readingThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Continue readingThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business ...
Continue readingThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue readingThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Continue reading“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue readingThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue readingThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Continue readingConstitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Japan ...
Continue reading