Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
Lire la suiteThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Lire la suiteThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Lire la suiteThe 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Lire la suiteThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Lire la suiteFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
Lire la suiteFoundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art ...
Lire la suiteThis book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Lire la suiteThis book constitutes the refereed proceedings of the 15th International Symposium Fundamentals of Computation Theory, FCT ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Lire la suite"Fuzzy Chaotic Systems" provides original heuristic research achievements and insightful ideas on the interactions or intrinsic ...
Lire la suiteThis book is about relations between three different areas of mathematics and theoretical computer science: combinatorial ...
Lire la suiteThis book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Lire la suiteThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Lire la suiteImage and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...
Lire la suiteThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Lire la suiteThe Blockchain technology is the buzzword of the year, and as this new technology slowly matured, it seems clear that from ...
Lire la suite