This book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteIt explores the diverse phenomena which are challenging the international law of the sea today, using the unique perspective ...
Lire la suiteThis volume of the AIDA Europe Research Series on Insurance Law and Regulation brings together contributions from authors ...
Lire la suiteThis book delivers a thorough and essential analysis of current economic policy, transformation and legislative changes in ...
Lire la suiteThe non-interference perspective is common when theorizing about the protection of the private life of individuals and their ...
Lire la suiteScience has development from a self-evident public good to being highly valued in other contexts for different reasons: strengthening ...
Lire la suiteThe Waste Market undertakes the interesting task of examining the creative ways in which a handful of European countries, ...
Lire la suiteTCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...
Lire la suiteThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lire la suiteThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lire la suiteThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Lire la suiteThis book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...
Lire la suiteThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Lire la suiteThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Lire la suiteThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Lire la suiteInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lire la suiteThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Lire la suite