This second book in a series of three volumes examines the repertoire of policies and programmes led by EU Member States ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suiteThis book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to ...
Lire la suiteThis book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
Lire la suiteMobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
Lire la suiteThis book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Conference MCO 2008, Metz, France, September 2008.The ...
Lire la suiteThis book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...
Lire la suiteMolecular Mechanisms of Plant and Microbe Coexistence presents studies on the complex and manifold interactions of plants ...
Lire la suiteMultimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Lire la suiteMedia forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
Lire la suiteProvides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Lire la suiteOz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting ...
Lire la suiteMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Lire la suiteThis book surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together ...
Lire la suiteNanotechnology is one of the fastest growing technological fields of the 21st century. Nanotechnologies will impact numerous ...
Lire la suiteprovides a comprehensive analysis of national security exceptions in international trade and investment agreements. The subject ...
Lire la suiteNet-Centric Approaches to Intelligence and National Security considers the web architectures and recent developments that ...
Lire la suiteThis volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...
Lire la suite