This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Lee masThe three volume set LNCS 4232, LNCS 4233, and LNCS 4234 constitutes the refereed proceedings of the 13th International Conference ...
Lee masThis book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masConstitutes the proceedings of the 5 confederated international conferences on Cooperative Information Systems, Distributed ...
Lee masThis two-volume set LNCS 4803/4804 constitutes the refereed proceedings of the five confederated international conferences ...
Lee masThis two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
Lee masThis two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
Lee masOptical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...
Lee masPeer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...
Lee masEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThe significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...
Lee masThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
Lee masConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
Lee masMycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...
Lee masInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Lee masWhile addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
Lee masThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Lee masWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Lee mas