Electronic Books

Total Books: 241 - 260 /263
The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings

This volume contains the proceeding softhe Internet of Things (IOT)Conference 2008, the ?rst international conference of ...

Lire la suite
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lire la suite
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lire la suite
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lire la suite
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

Lire la suite
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Lire la suite
Topics in Cryptology -- CT-RSA 2005

This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...

Lire la suite
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

Lire la suite
Towards Sustainable Society on Ubiquitous Networks : The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japan

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lire la suite
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

Lire la suite
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lire la suite
Trust, Privacy and Security in Digital Business

This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...

Lire la suite
Trust, Privacy and Security in Digital Business

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...

Lire la suite
Trust, Privacy and Security in Digital Business : 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...

Lire la suite
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Lire la suite
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

Lire la suite
Ubiquitous Communications and Network Computing

This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...

Lire la suite
Ubiquitous Intelligence and Computing : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...

Lire la suite
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

Lire la suite
Web Information Systems and Applications

This book constitutes the proceedings of the 17th International Conference on Web Information Systems and Applications, WISA ...

Lire la suite
Total Books: 241 - 260 /263