Electronic Books

Total Books: 261 - 280 /370
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lire la suite
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lire la suite
Progress in WWW Research and Development : 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings

This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...

Lire la suite
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lire la suite
Queuing Theory and Telecommunications

Queuing Theory and Telecommunications : Networks and Applications provides some fundamental knowledge in queuing theory, ...

Lire la suite
RFID Security and Privacy : Concepts, Protocols, and Architectures

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...

Lire la suite
Reasoning Web : 4th International Summer School 2008, Venice, Italy, September 7-11, 2008, Tutorial Lectures

This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...

Lire la suite
Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings

This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...

Lire la suite
Reconfigurable Computing: Architectures, Tools and Applications : 4th International Workshop, ARC 2008, London, UK, March 26-28, 2008. Proceedings

The idea of reconfigurable hardware systems has represented the Holy Grail for computer system designers.It has been recognized ...

Lire la suite
Reliable Software Technologies - Ada-Europe 2008 : 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedings

This book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...

Lire la suite
Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...

Lire la suite
Resilient Networks and Services : Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings

The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...

Lire la suite
Reversible Computation: Extending Horizons of Computing Selected Results of the COST Action IC1405

This State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing ...

Lire la suite
RoboCup 2007: Robot Soccer World Cup XI

The book presented at the symposium focused on topics related to these three events and to artificial intelligence and robotics ...

Lire la suite
Rule Representation, Interchange and Reasoning on the Web : International Symposium, RuleML 2008, Orlando, FL, USA, October 30-31, 2008. Proceedings

This book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...

Lire la suite
SOFSEM 2008: Theory and Practice of Computer Science : 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings

This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...

Lire la suite
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Lire la suite
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Lire la suite
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Lire la suite
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Lire la suite
Total Books: 261 - 280 /370