Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9295 dokumen yang sesuai dengan query
cover
Ari Juels, editor
"This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID."
Berlin: Springer-Verlag, 2012
e20407984
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies."
Berlin: Springer-Verlag, 2012
e20409034
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds."
Heidelberg: Springer, 2012
e20408219
eBooks  Universitas Indonesia Library
cover
Martin Charles Golumbic, editor
"This book constitutes the thoroughly refereed proceedings of the 38th International Workshop on Graph Theoretic Concepts in Computer Science (WG 2012) held in Jerusalem, Israel on June 26-28, 2012. The 29 revised full papers presented were carefully selected and reviewed from 78 submissions. The papers are solicited describing original results on all aspects of graph-theoretic concepts in Computer Science, e.g. structural graph theory, sequential, parallel, randomized, parameterized, and distributed graph and network algorithms and their complexity, graph grammars and graph rewriting systems, graph-based modeling, graph-drawing and layout, random graphs, diagram methods, and support of these concepts by suitable implementations. The scope of WG includes all applications of graph-theoretic concepts in Computer Science, including data structures, data bases, programming languages, computational geometry, tools for software construction, communications, computing on the web, models of the web and scale-free networks, mobile computing, concurrency, computer architectures, VLSI, artificial intelligence, graphics, CAD, operations research, and pattern recognition
"
Berlin: Springer, 2012
e20406836
eBooks  Universitas Indonesia Library
cover
Yun Qing Shi, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6 technical sessions, covering the topics of steganography and steganalysis, watermarking, visual cryptography, forensics, anti-forensics, fingerprinting, privacy and security."
Berlin: [, Springer-Verlag ], 2012
e20410075
eBooks  Universitas Indonesia Library
cover
"This book constitutes the joint thoroughly refereed post-proceedings of the Second International Workshop on Modeling Social Media, MSM 2011, held in Boston, MA, USA, in October 2011, and the Second International Workshop on Mining Ubiquitous and Social Environments, MUSE 2011, held in Athens, Greece, in September 2011. The 9 full papers included in the book are revised and significantly extended versions of papers submitted to the workshops. They cover a wide range of topics organized in three main themes, communities and networks in ubiquitous social media, mining approaches, and issues of user modeling, privacy and security."
Berlin: Springer-Verlag, 2012
e20408552
eBooks  Universitas Indonesia Library
cover
"The volume contains 6 research papers, which have been carefully reviewed and selected from 12 submissions, plus the 3 keynotes presented at the workshop. The topics cover all stages of the business intelligence cycle, including capturing of real-time data, handling of temporal or uncertain data, performance issues, event management, and the optimization of complex ETL workflows.
"
Berlin: Springer-Verlag, 2012
e20409276
eBooks  Universitas Indonesia Library
cover
Pascal Bouvry, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three thematic tracks: security and trust, data mining and machine learning, and natural language processing."
Berlin: Springer-Verlag, 2012
e20408078
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration."
Berlin: Springer-Verlag , 2012
e20410386
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects of ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies."
Berlin: Springer-Verlag, 2012
e20409541
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>