This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Lire la suiteThis book is about relations between three different areas of mathematics and theoretical computer science: combinatorial ...
Lire la suiteThis book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Lire la suiteThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Lire la suiteImage and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...
Lire la suiteThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Lire la suiteThe Blockchain technology is the buzzword of the year, and as this new technology slowly matured, it seems clear that from ...
Lire la suiteThis updated edition of Information Assurance: Security in the Information Environment was written to help IT managers and ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Lire la suiteThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Lire la suiteThis book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
Lire la suiteThe 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
Lire la suiteThis volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...
Lire la suiteThe 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
Lire la suiteConstitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...
Lire la suiteThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
Lire la suite