Electronic Books

Total Books: 181 - 200 /253
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Lire la suite
RFID Security and Privacy : Concepts, Protocols, and Architectures

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...

Lire la suite
Recent Advances in Intrusion Detection

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...

Lire la suite
Recent Advances in Intrusion Detection (vol. # 3858)

This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...

Lire la suite
Recent Advances in Intrusion Detection (vol. # 4219)

This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...

Lire la suite
Recordkeeping, Ethics and Law

Distributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed ...

Lire la suite
NoIMG
Research Methodologies and Ethical Challenges in Digital Migration Studies : Caring For (Big) Data?

This book investigates the methodological and ethical dilemmas involved when working with digital technologies and large-scale ...

Lire la suite
Safeguards in a World of Ambient Intelligence

It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...

Lire la suite
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

Lire la suite
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

Lire la suite
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

Lire la suite
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

Lire la suite
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

Lire la suite
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Lire la suite
Security and Cryptography for Networks

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...

Lire la suite
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

Lire la suite
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 4357)

"These procee dingscontain the papers of the 3rd European Workshopon Security and Privacy in Ad Hoc and Sensor Networks ...

Lire la suite
Security and Privacy in Digital Economy

This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...

Lire la suite
Security and Privacy in Digital Rights Management

This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...

Lire la suite
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Lire la suite
Total Books: 181 - 200 /253