Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 14194 dokumen yang sesuai dengan query
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011. The 37 revised full papers presented were carefully selected from numerous submissions. Conference papers promote research and development activities of innovative applications and methodologies and applied technologies."
Heidelberg: [Springer, ], 2012
e20409313
eBooks  Universitas Indonesia Library
cover
Pascal Bouvry, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three thematic tracks: security and trust, data mining and machine learning, and natural language processing."
Berlin: Springer-Verlag, 2012
e20408078
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration."
Berlin: Springer-Verlag , 2012
e20410386
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Málaga, Spain, in November 2011.
The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration."
Heidelberg: Springer, 2012
e20408155
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-proceedings of the 4th International Conference on Software Language Engineering, SLE 2011, held in Braga, Portugal, in July 2011.
The 18 papers presented together with 4 tool/language demonstration papers were carefully reviewed and selected from numerous submissions. SLE’s foremost mission is to encourage and organize communication between communities that have traditionally looked at software languages from different, more specialized, and yet complementary perspectives. SLE emphasizes the fundamental notion of languages as opposed to any realization in specific technical spaces"
Berlin: Springer-Verlag, 2012
e20410291
eBooks  Universitas Indonesia Library
cover
Sebastian Mödersheim, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application."
Berlin: Springer-Verlag, 2012
e20408103
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography."
Berlin: Springer-Verlag, 2012
e20410274
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component conferences, namely: DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP, and WINSYS which together form the ICETE joint conference."
Berlin: Springer-Verlag, 2012
e20408165
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Second International ICST Conference on Wireless Mobile Communication and Healthcare, MobiHealth 2011, held on Kos Island, Greece, in October 2011. The 60 revised full papers presented were carefully reviewed and selected from more than 80 submissions. The papers are organized in 10 sessions and two workshops with topics covering intrabody communications, chronic disease monitoring and management, ambient assistive technologies, implantable and wearable sensors, emergency and disaster applications."
Heidelberg : Springer, 2012
e20406445
eBooks  Universitas Indonesia Library
cover
"This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography, encryption, cryptanalysis and automatic verification, and formal methods in network security."
Berlin: Springer-Verlag, 2012
e20408183
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>