Electronic Books

Total Books: 261 - 280 /308
The Ethics of Medical Data Donation

This book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument ...

Lee mas
The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4–10, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The ...

Lee mas
The Future of the Law of the Sea

It explores the diverse phenomena which are challenging the international law of the sea today, using the unique perspective ...

Lee mas
NoIMG
The Governance of Insurance Undertakings : Corporate Law and Insurance Regulation

This volume of the AIDA Europe Research Series on Insurance Law and Regulation brings together contributions from authors ...

Lee mas
The Libyan Economy

This book delivers a thorough and essential analysis of current economic policy, transformation and legislative changes in ...

Lee mas
The Private Sphere : An Emotional Territory And Its Agent

The non-interference perspective is common when theorizing about the protection of the private life of individuals and their ...

Lee mas
The Public Nature of Science under Assault

Science has development from a self-evident public good to being highly valued in other contexts for different reasons: strengthening ...

Lee mas
The Waste Market

The Waste Market undertakes the interesting task of examining the creative ways in which a handful of European countries, ...

Lee mas
Theory of Cryptography

TCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...

Lee mas
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lee mas
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lee mas
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lee mas
Theory of Cryptography (vol. # 3378)

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...

Lee mas
Theory of Cryptography (vol. # 3876)

This book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...

Lee mas
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

Lee mas
Tools and Algorithms for the Construction and Analysis of Systems

The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...

Lee mas
Topics in Cryptology -- CT-RSA 2005

This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...

Lee mas
Trust Management

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Lee mas
Trust Management (vol. # 3477)

The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...

Lee mas
Trust Management (vol. # 3986)

This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...

Lee mas
Total Books: 261 - 280 /308