It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...
Lire la suite
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...
Lire la suite
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
Lire la suite
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lire la suite
Designed to help you make the most of your study time. Maximize your performance on the exam by learning to: * Create, trace, ...
Lire la suite
This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suite
This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suite
This book discusses the application of molecular biology in resource science and authentication of traditional Chinese medicine ...
Lire la suite
This book constitutes the refereed proceedings of the International Workshop on Multimedia Content Representation, Classification ...
Lire la suite
This book constitutes the thoroughly refereed post-proceedings of the First International CLEAR 2006 Evaluation Campaign ...
Lire la suite
This book constitutes the thoroughly refereed joint post-workshop proceedings of two co-located events: the Second International ...
Lire la suite
Constitutes the refereed proceedings of the 6th International Workshop on Multiple Classifier Systems, MCS 2005. This book ...
Lire la suite
The 82 revised full papers were carefully reviewed and selected from numerous submissions for inclusion in the book. The ...
Lire la suite
This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...
Lire la suite
Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes ...
Lire la suite
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Lire la suite
The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Lire la suite
Constitutes the proceedings of the 5 confederated international conferences on Cooperative Information Systems, Distributed ...
Lire la suite
This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
Lire la suite
This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
Lire la suite