The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
Lee masThis book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...
Lee masThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Lee masThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Lee masIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lee masIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lee masThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
Lee masFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Lee masConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
Lee masThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Lee masIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lee masIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lee masIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lee masFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
Lee masThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...
Lee masGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Lee masThe 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...
Lee masImage and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Lee masThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Lee mas