Electronic Books

Total Books: 1 - 16 /16
Autonomic and Trusted Computing

To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...

Lee mas
Autonomic and Trusted Computing

To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...

Lee mas
Autonomic and Trusted Computing

This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ...

Lee mas
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

Lee mas
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

Lee mas
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Lee mas
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Lee mas
Frontiers in Hardware Security and Trust: Theory, design and practice

The footprint and power constraints imposed on internet-of-things end-points, smart sensors, mobile and ad hoc network devices ...

Lee mas
ISSE 2006 — Securing Electronic Busines Processes

This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...

Lee mas
Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...

Lee mas
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Lee mas
Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...

Lee mas
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Trust Management (vol. # 3477)

The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...

Lee mas
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Lee mas
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

Lee mas
Total Books: 1 - 16 /16