This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
Lee masThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...
Lee masThis book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
Lee masthis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
Lee masWith the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Lee masWith the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Lee masThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Lee masThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Lee masThis two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lee masThis two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lee masAims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...
Lee masProvides a structured, industry-independent and at the same time practical insight into all types of business partnerships. ...
Lee masScientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...
Lee masThe global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication ...
Lee masAs society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
Lee masThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Lee masThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Lee masPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
Lee masOffers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
Lee masThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
Lee mas