This tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
Lire la suiteProvides expert guidance and valuable insights on getting the most out of Big Data systems. Helps readers understand how ...
Lire la suiteThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lire la suiteLast, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and Networking, ...
Lire la suiteThis book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ...
Lire la suiteThis book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...
Lire la suiteVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Lire la suiteVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Lire la suiteThis book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies ...
Lire la suiteThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Lire la suiteThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Lire la suiteThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Lire la suiteThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Lire la suiteThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Lire la suite