Electronic Books

Total Books: 261 - 280 /370
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lee mas
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lee mas
Progress in WWW Research and Development : 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings

This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...

Lee mas
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lee mas
Queuing Theory and Telecommunications

Queuing Theory and Telecommunications : Networks and Applications provides some fundamental knowledge in queuing theory, ...

Lee mas
RFID Security and Privacy : Concepts, Protocols, and Architectures

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...

Lee mas
Reasoning Web : 4th International Summer School 2008, Venice, Italy, September 7-11, 2008, Tutorial Lectures

This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...

Lee mas
Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings

This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...

Lee mas
Reconfigurable Computing: Architectures, Tools and Applications : 4th International Workshop, ARC 2008, London, UK, March 26-28, 2008. Proceedings

The idea of reconfigurable hardware systems has represented the Holy Grail for computer system designers.It has been recognized ...

Lee mas
Reliable Software Technologies - Ada-Europe 2008 : 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedings

This book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...

Lee mas
Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...

Lee mas
Resilient Networks and Services : Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings

The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...

Lee mas
Reversible Computation: Extending Horizons of Computing Selected Results of the COST Action IC1405

This State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing ...

Lee mas
RoboCup 2007: Robot Soccer World Cup XI

The book presented at the symposium focused on topics related to these three events and to artificial intelligence and robotics ...

Lee mas
Rule Representation, Interchange and Reasoning on the Web : International Symposium, RuleML 2008, Orlando, FL, USA, October 30-31, 2008. Proceedings

This book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...

Lee mas
SOFSEM 2008: Theory and Practice of Computer Science : 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings

This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...

Lee mas
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Lee mas
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Lee mas
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Lee mas
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Lee mas
Total Books: 261 - 280 /370