This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Continue reading
This book is part of a two-volume work that constitutes the refereed proceedings of the 11th IFIP TC13 International Conference ...
Continue reading
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
Continue reading
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue reading
This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Continue reading
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Continue reading
All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
Continue reading
Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
Continue reading
This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
Continue reading
Information Processing and Security Systems is a collection of forty papers that were originally presented at an international ...
Continue reading
This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA ...
Continue reading
The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
Continue reading
This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...
Continue reading
Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
Continue reading
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
Continue reading
Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...
Continue reading
Provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, ...
Continue reading
his volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...
Continue reading