The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...
Lire la suiteThis book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...
Lire la suiteThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Lire la suiteThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
Lire la suiteFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Lire la suiteConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Lire la suiteIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lire la suiteIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lire la suiteIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lire la suiteFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...
Lire la suiteGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Lire la suiteThe 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...
Lire la suiteImage and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Lire la suiteThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Lire la suite