This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Continue readingThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Continue readingThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Continue readingThis book is about relations between three different areas of mathematics and theoretical computer science: combinatorial ...
Continue readingThis book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Continue readingThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue readingImage and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...
Continue readingThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Continue readingThe Blockchain technology is the buzzword of the year, and as this new technology slowly matured, it seems clear that from ...
Continue readingThis updated edition of Information Assurance: Security in the Information Environment was written to help IT managers and ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Continue readingThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
Continue readingThe 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
Continue readingThis volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...
Continue readingThe 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
Continue readingConstitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...
Continue readingThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
Continue reading