viii As we look for such a strategy, technological development races on with new technologies that make our efforts and existing technologies on which they are based obsolete in shorter and shorter periods.
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it.
The 15th International Workshop on Conceptual Structures ICCS 2007 brings together numerous discussions between international groups of researchers from the field of Information and Communications Technology (ICT).
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices.
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
The five-volume set CCIS 1832-1836 contains the extended abstracts of the posters presented during the 25th International Conference on Human-Computer Interaction, HCII 2023, which was held as a hybrid event in Copenhagen, Denmark, in July 2023.
Summary Programming with Types teaches you to design safe, resilient, correct software that's easy to maintain and understand by taking advantage of the power of strong type systems.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book constitutes the refereed proceedings of the 20th China Conference on Machine Translation, CCMT 2024, which took place in Xiamen, China, during November 8-10, 2024.
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
As an efficient 3D vision solution, point clouds have been widely applied into diverse engineering scenarios, including immersive media communication, autonomous driving, reverse engineering, robots, topography mapping, digital twin city, medical analysis, digital museum, etc.
As an efficient 3D vision solution, point clouds have been widely applied into diverse engineering scenarios, including immersive media communication, autonomous driving, reverse engineering, robots, topography mapping, digital twin city, medical analysis, digital museum, etc.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024.
In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management.
This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment.
This clearly written and enlightening textbook provides a concise, introductory guide to the key mathematical concepts and techniques used by computer scientists.
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression.
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it.
In this book, Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes.
This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding.
Recent and well-publicised disasters have highlighted the fact that organisations of all kinds - from healthcare to aerospace - are critically dependent on Information Technology systems.
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;What is security?
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The five-volume set CCIS 1832-1836 contains the extended abstracts of the posters presented during the 25th International Conference on Human-Computer Interaction, HCII 2023, which was held as a hybrid event in Copenhagen, Denmark, in July 2023.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
3D point clouds have broad applications across various industries and have contributed to advancements in fields such as autonomous driving, immersive media, metaverse, and cultural heritage protection.
This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024.
The three-volume set LNCS 15338, 15339 and 15340 constitutes the refereed proceedings from the 41st Computer Graphics International Conference, CGI 2024, held during July 1-5, 2024, in Geneva, Switzerland.