This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Lire la suiteComplete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
Lire la suiteThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
Lire la suiteThe 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Lire la suiteThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Lire la suiteConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
Lire la suiteThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
Lire la suiteInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lire la suiteThis book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Lire la suiteInformation Theory and Network Coding consists of two parts: Components of Information Theory, and Fundamentals of Network ...
Lire la suiteInformation visualization is not only about creating graphical displays of complex and latent information structures; it ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...
Lire la suiteThe main theme in this book is to teach modeling based on the principle that the objective is to extract the information ...
Lire la suiteInnovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously ...
Lire la suite