Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
In light of the digital revolution and the implementation of social media applications and big data innovations, it analyzes threat perceptions... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
introduces a mobile IoT simulator designed to evaluate the behavior of IoT systems, in addition to a novel approach to manage hyper-connectivity in the IoT;
Bemærk: Kan ikke leveres før jul.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions.
Bemærk: Kan ikke leveres før jul.
"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component.
Bemærk: Kan ikke leveres før jul.
?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological... Læs mere
Bemærk: Kan ikke leveres før jul.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
Bemærk: Kan ikke leveres før jul.
This volume presents the refereed proceedings of the 8th International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 4th International Conference on... Læs mere