This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lee masThis two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lee masThe two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on ...
Lee masThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Lee masThe First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
Lee masWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
Lee masThis book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
Lee masThis classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Lee masAll papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
Lee masThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Lee masProvides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Lee masOptical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...
Lee masThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lee masThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lee mas