Free Delivery Over $100
4195 books were found.
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy... Read More >>
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International... Read More >>
Read More >>
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data... Read More >>
Also included are papers from the chairpersons of the six IFIP Working Groups on education (elementary/primary education,... Read More >>
Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile... Read More >>
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management,... Read More >>
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing,... Read More >>
This book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure,... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and... Read More >>
This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security,... Read More >>
Explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic... Read More >>
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto... Read More >>
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013,... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application... Read More >>
These – and 6 invited papers now cover and even broader scope, referring to many types of autonomous wireless networks... Read More >>
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on... Read More >>
This book proposes a new model—the IrisCryptoAgentSystem (ICAS)—based on a biometric method for authentication using... Read More >>
The papers have been organized into topical sections on privacy and identity management, anonymous credentials,... Read More >>