The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information.
This volume presents the articles accepted for the 8th International Conference on Computer Analysis of Images and Patterns (CAIP'99), held in Ljubljana, Slovenia, 1{3 September 1999.
The Internet and the World Wide Web (WWW) are becoming more and more important in our highly interconnected world as more and more data and information is made available for online access.
Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures - both government and commercial - such as the effective prevention of, detection of, reporting of, response to and recovery from security incidents.
LNCS volumes 2073 and 2074 contain the proceedings of the International Conference on Computational Science, ICCS 2001, held in San Francisco, California, May 27 -31, 2001.
The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara.
The 26th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2000) was held at Waldhaus Jakob, in Konstanz, Germany, on 15{ 17 June 2000.
This book constitutes the refereed proceedings of the 8th East European Conference on Advances in Databases and Information Systems, ADBIS 2004, held in Budapest, Hungary, in September 2004.
Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc.
It is increasingly being recognized that the experimental and theoretical study of the complex system brain requires the cooperation of many disciplines, in- cluding biology, medicine, physics, chemistry, mathematics, computer science, linguistics, and others.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age.
It is our belief that researchers and practitioners acquire, through experience and word-of-mouth, techniques and heuristics that help them successfully apply neural networks to di cult real world problems.
This volume contains selected papers presented at the 12th International C- ference on Conceptual Structures, ICCS 2004, held in Huntsville Alabama, July 19-23, 2004.
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication.
Deeply rooted in fundamental research in Mathematics and Computer Science, Cellular Automata (CA) are recognized as an intuitive modeling paradigm for Complex Systems.
Organic Computing is a research field emerging around the conviction that problems of organization in complex systems in computer science, telecommunications, neurobiology, molecular biology, ethology, and possibly even sociology can be tackled scientifically in a unified way.
This book contains the papers presented at the 9th International Workshop on Field ProgrammableLogic and Applications (FPL'99), hosted by the University of Strathclyde in Glasgow, Scotland, August 30 - September 1, 1999.
The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes.
As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas.