Free Delivery Over $100
3712 books were found.
The topics dealt with are algorithms and data structures, applications, combinatorial enumeration, combinatorial... Read More >>
Constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference... Read More >>
As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST... Read More >>
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE),... Read More >>
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information... Read More >>
Read More >>
The papers cover various topics such as wireless network security, network intrusion detection, security and privacy... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec... Read More >>
This book contains the best papers of the Third International Conference on Software and Data Technologies (ICSOFT... Read More >>
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP... Read More >>
As intelligent autonomous agents and multiagent system applications become more pervasive, it becomes increasingly... Read More >>
This book covers the most prominent research issues in multimedia and is divided into four main sections: i) content... Read More >>
<p>This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security,... Read More >>
The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital... Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
Digital watermarking is one of the widely used techniques used in the world in the area of information security.This... Read More >>
<p>This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference... Read More >>
MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems.... Read More >>