This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lee masThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Lee masThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lee masThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
Lee masThis book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
Lee masThe first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lee masThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Lee masThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lee masThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lee masThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Lee masInterference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
Lee masThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Lee masThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lee masThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
Lee masThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lee masThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lee masThis book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...
Lee masThis book constitutes the proceedings of the 21st International Conference on Web Engineering, ICWE 2021, which was supposed ...
Lee masThe First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
Lee masThis book constitutes the proceedings of the 21st International Conference on Web Information Systems Engineering, WISE 2020, ...
Lee mas