This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lire la suiteThis two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Lire la suiteThe two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Lire la suiteThe First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
Lire la suiteWe are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
Lire la suiteThis classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Lire la suiteAll papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
Lire la suiteThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Lire la suiteProvides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Lire la suiteOptical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suite