This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suiteThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Lire la suiteThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Lire la suiteThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Lire la suiteThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suiteThis book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
Lire la suiteVolume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
Lire la suitethis volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Lire la suiteThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Lire la suiteThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Lire la suiteThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lire la suiteThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suiteThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suiteProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Lire la suiteThis volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
Lire la suiteInformation Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
Lire la suiteThis book is the first to systematically introduce the principles of urban informatics and its application to every aspect ...
Lire la suite