Thousands of mini computers (comparable to a stick of chewing gum in size), equipped with sensors, are deployed in some terrain ...
Lire la suiteThousands of mini computers (comparable to a stick of chewing gum in size), equipped with sensors, are deployed in some terrain ...
Lire la suiteThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suiteThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lire la suiteThe 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Lire la suiteThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Lire la suiteThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Lire la suite