Electronic Books

Total Books: 181 - 200 /220
NoIMG
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves

This book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...

Lee mas
Selected Areas in Cryptography

Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...

Lee mas
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Lee mas
Smart Homes and Health Telematics : 6th International Conference, ICOST 2008 Ames, IA, USA, June 28-July 2, 2008 Proceedings

The book is organized in topical sections on assistive technology to improve quality of life for older adults and their caregivers; ...

Lee mas
Smart Sensing and Context

EuroSSC 2007 aimed to reflect two complementary viewpoints: a technology-driven viewpoint which encompasses the diversity ...

Lee mas
Social Inclusion: Societal and Organizational Implications for Information Systems

This book contains the proceedings of the Working Conference on the societal and organizational implications for information ...

Lee mas
Spaces, Spatiality and Technology

Dix and his colleagues, for example, in chapter 12 explore a complex of models - of spatial context, of 'mixed reality boundaries' ...

Lee mas
Technology-Oriented Customer Touchpoints in Context of Services in Retailing : A Differentiated Analysis on Social Presence and Privacy Calculus / Tobias Röding

Addresses the topic of technology use along different touchpoints in context of different services in retailing, both in ...

Lee mas
Terrorism Informatics

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques ...

Lee mas
The Economics and Regulation of Financial Privacy

This book provides the first in-depth analysis of the economics and regulation of financial privacy. It is an international ...

Lee mas
The Ethics of Cybersecurity

This book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...

Lee mas
The Ethics of Medical Data Donation

This book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument ...

Lee mas
The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4–10, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The ...

Lee mas
The Private Sphere : An Emotional Territory And Its Agent

The non-interference perspective is common when theorizing about the protection of the private life of individuals and their ...

Lee mas
Theory of Cryptography

TCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...

Lee mas
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lee mas
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lee mas
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lee mas
Theory of Cryptography (vol. # 3378)

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...

Lee mas
Theory of Cryptography (vol. # 3876)

This book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...

Lee mas
Total Books: 181 - 200 /220