This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Continue reading
Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
Continue reading
The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
Continue reading
The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Continue reading
This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Continue reading
This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Continue reading
This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue reading
Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
Continue reading
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Continue reading
This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
Continue reading
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue reading
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Continue reading
Information Theory and Network Coding consists of two parts: Components of Information Theory, and Fundamentals of Network ...
Continue reading
Information visualization is not only about creating graphical displays of complex and latent information structures; it ...
Continue reading
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...
Continue reading
The main theme in this book is to teach modeling based on the principle that the objective is to extract the information ...
Continue reading
Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously ...
Continue reading
“Intelligent systems are those which produce intelligent o?springs.” AI researchers have been focusing on developing ...
Continue reading