The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Continue reading
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue reading
These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue reading
This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue reading
Provides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
Continue reading
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue reading
The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue reading
This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue reading
The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Continue reading
This book constitutes the refereed proceedings of the International Conference on Computer Vision and Graphics, ICCVG 2020, ...
Continue reading
This book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ...
Continue reading
Thesearetheproceedingsofthe21stInternationalSymposiumonComputerand ? Information Sciences (ISCIS 2006) held in Istanbul, ...
Continue reading
This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...
Continue reading
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly ...
Continue reading
Constituents of Modern System-safety Thinking contains the invited papers presented at the Thirteenth annual Safety-critical ...
Continue reading
This book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...
Continue reading
History based access control and secure information flow The spec# programming system Mastering test generation from smart ...
Continue reading