This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Lire la suiteTelecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...
Lire la suiteSecurity for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the ...
Lire la suiteAd hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, ...
Lire la suiteThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Lire la suiteThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Lire la suiteIt will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Lire la suiteDesign and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
Lire la suiteThis book constitutes the refereed proceedings of the Second IEEE International Workshop on Self-Managed Networks, Systems, ...
Lire la suiteIn this volume, concepts of nonlinear dynamics and self-organization are applied to topics in materials sciences with emphasis ...
Lire la suiteThis book proposes, utilizes, and demonstrates the research superiority of a highly developed multidisciplinary theory models ...
Lire la suiteThis book constitutes the refereed proceedings of the First International Workshop on Self-Organizing Systems, IWSOS 2006. ...
Lire la suiteThe 17 revised full papers and five revised short papers presented together with two invited talks were carefully selected ...
Lire la suiteThis book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
Lire la suiteInformation systems can be complex due to numerous factors including scale, decentralization, heterogeneity, mobility, dynamism, ...
Lire la suiteSemantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. ...
Lire la suiteThe book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
Lire la suiteThis book cover topics such as: web semantics and linked (open) data; machine learning and deep learning techniques; semantic ...
Lire la suiteStaab and Stuckenschmidt structured the selected contributions into four parts: Part I, "Data Storage and Access", prepares ...
Lire la suite