Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’.
Bemærk: Kan ikke leveres før jul.
This book starts by presenting the basics of reinforcement learning using highly intuitive and easy-to-understand examples and... Læs mere
Bemærk: Kan ikke leveres før jul.
?This two-volume set (CCIS 1075 and CCIS 1076) constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
This two volume set (CCIS 1058 and 1059) constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 8th International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the First International Conference on Big Data and Security, ICBDS 2019, held in Nanjing, China, in December 2019. The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions.
Bemærk: Kan ikke leveres før jul.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
Bemærk: Kan ikke leveres før jul.
This book constitutes revised and selected papers from the 6th... Læs mere
Bemærk: Kan ikke leveres før jul.
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information... Læs mere