This book states that the endemic societal faultlines of our times are deeply intertwined and that they confront us with ...
Lire la suiteThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
Lire la suiteThis second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suiteThe Central Asian republics and neighboring countries are currently experiencing these problems - problems that will become ...
Lire la suiteThis book features various studies on democratization, transformation, political and economic development, and security ...
Lire la suiteThis book examines India’s economic development, agricultural production, and nutrition through the lens of a “Food Systems ...
Lire la suiteInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lire la suiteThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Lire la suiteThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThis book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business ...
Lire la suiteThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Lire la suiteThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lire la suite“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Lire la suiteThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suiteThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Lire la suiteConstitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Japan ...
Lire la suiteThis book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Computing, UbiComp 2006. ...
Lire la suiteThe Ubiquitous Computing conference series provides the premier forum in which to present original research results in all ...
Lire la suite