Filter
Informationsteori
Filter
This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of …
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable …
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in …
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD …
Given the pervasive nature of information technology and information systems in the modern world, the design and development of IS and IT are critical issues of concern. New …
In the mathematical treatment of many problems which arise in physics, economics, engineering, management, etc., the researcher frequently faces two major difficulties: infinite …
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to …
Over recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of Asynchronous …
This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in …
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in …