Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the First International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book discusses applications of blockchain in healthcare sector. The book also covers gaps of the current available books/literature available for use cases of Distributed Ledger Technology (DLT) in healthcare.
Bemærk: Kan ikke leveres før jul.
This book discusses the state-of-the-art techniques in the domain of contact tracing applications. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the... Læs mere
Bemærk: Kan ikke leveres før jul.
The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Traditionally, the consensus protocols are studied either in the synchronous or in the asynchronous communication setting and very often the protocols in the former category serve as the basis for the protocols in the latter category.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the 4th... Læs mere
Bemærk: Kan ikke leveres før jul.
EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners.
Bemærk: Kan ikke leveres før jul.
The papers are organized in the following topical sections: Emerging Technologies and Protection of Personal Data, Data Protection Principles and Data Subject Rights, Modelling Data Protection and Privacy, and Modelling Perceptions of Privacy.
Bemærk: Kan ikke leveres før jul.
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic.
Bemærk: Kan ikke leveres før jul.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 – 7 January 2024.