This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.
... ISSE 2008 Securing Electronic Business Processes. Springer, Heidelberg (2009). https://doi.org/10.1007/978-38348-9283-639 Ståhlberg, M.: The trojan money spinner. In: Virus Bulletin Conference, vol. 4 (2007) Toreini, E., Shahandashti ...
Kewei Sha, Aaron Striegel, Min Song. Sensor and Ad Hoc Communications and Networks (SECON 2009), New Orleans, LA, June. [43] Li, N., Zhang, N., Das, S. K., and Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: a ...
This book is a collection of high-quality peer reviewed contributions from the academicians, researchers, practitioners, and industry professionals, accepted in the International Conference on Advances in Data Computing, Communication and ...
Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists.
In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.
This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications.
... networks for intelligent transportation system: recent advances and future challenges. In: Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.) Futuristic Trends in Network and Communication Technologies ...
Proceedings of the MSc/MRes programmes from the School of Computing, Communications and Electronics, ... Steels, L. and Kaplan, F. (2000) “AIBO's first words: The social learning of language and meaning”, Evolution ofCommunication, vol.
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research.
(2009) „Projects in Computing and information Systems : A students guide‟, Pearson Education Limited. ... Factors Affecting Information Security Behaviour A.Rajendran, S.M.Furnell and T.Gabriel Centre 41 Section 2 – Computer and ...